|
Family: CGI abuses --> Category: attack
osCommerce attributes SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for SQL injection flaw in osCommerce
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to a
SQL injection attack.
Description :
The remote host is running osCommerce, an open-source e-commerce
system.
The version of osCommerce installed on the remote host fails to
properly sanitize input used for product attributes before using it in
a database query in the 'shopping_cart.php' script. Provided PHP's
'magic_quotes_gpc' setting is disabled, an unauthenticated attacker
may be able to exploit this issue to uncover sensitive information
such as password hashes, modify data, launch attacks against the
underlying database, etc.
See also :
http://www.gulftech.org/?node=research&article_id=00110-08172006
http://forums.oscommerce.com/index.php?showtopic=223556&pid=918371
Solution :
Upgrade to osCommerce 2.2 Milestone 2 Update 060817 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|