Family: CGI abuses --> Category: attack
osCommerce attributes SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for SQL injection flaw in osCommerce
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP application that is prone to a
SQL injection attack.
The remote host is running osCommerce, an open-source e-commerce
The version of osCommerce installed on the remote host fails to
properly sanitize input used for product attributes before using it in
a database query in the 'shopping_cart.php' script. Provided PHP's
'magic_quotes_gpc' setting is disabled, an unauthenticated attacker
may be able to exploit this issue to uncover sensitive information
such as password hashes, modify data, launch attacks against the
underlying database, etc.
See also :
Upgrade to osCommerce 2.2 Milestone 2 Update 060817 or later.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.