Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • G GProtector
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributor statistics
    • Graph
    • Compare revisions
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Artifacts
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Gambio PublicGambio Public
  • GProtector
  • Merge requests
  • !6

refs #70846 usd-2023-0047

  • Review changes

  • Download
  • Patches
  • Plain diff
Merged Till Tepelmann requested to merge develop into master Jan 23, 2024
  • Overview 0
  • Commits 1
  • Pipelines 0
  • Changes 1

The /shop.php endpoint is vulnerable to a SQL Injection in the modifiers[attribute][] parameter.

Note: Upon discovery, our team immediately initiated the responsible disclosure process by contacting the vendor behind Gambio. Unfortunately, despite multiple attempts, our attempts to engage the vendor in resolving this issue have been met with silence. The vulnerability is still unfixed. Proof of Concept

The SQL Injection is error-based and can be triggered using a GET request to the following endpoint:

/shop.php?do=CheckStatus/Attributes&galleryHash=dddd&modifiers%5Battribute%5D%5B4%5D=9'&products_id=2&products_qty=1&target=cart&isProductInfo=1&page_token=

Assignee
Assign to
Reviewers
Request review from
Time tracking
Source branch: develop