[Question] osCommerce Input Validation Flaw in 'shopping_cart.php' |
22/08/2006 23:58:13 (+0700) | #1 | 16991 |
|
LeonHart
HVA Friend
|
Joined: 10/01/2003 11:11:52
Messages: 215
Location: Secret
Offline
|
|
Version(s): 2.2 Milestone 2
Description: A vulnerability was reported in osCommerce. A remote user can inject SQL commands.
The 'shopping_cart.php' script does not properly validate user-supplied input, as the magic quotes emulation implementation contains a flaw. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.
A remote user can exploit the tep_cache_also_purchased() function in 'cache.php' to determine whether files exist or not and determine the installation path.
James Bercegay of the GulfTech Security Research Team discovered this vulnerability.
The original advisory is available at:
http://www.gulftech.org/?node=research&article_id=00110-08172006
Impact: A remote user can execute SQL commands on the underlying database.
A remote user can determine the installation path and determine whether specified files exist on the target system.
Solution: The vendor has issued a fix (2.2 Milestone 2 060817 Update), available at:
http://www.oscommerce.com/solutions/downloads
The osCommerce advisory is available at:
http://forums.oscommerce.com/index.php?showtopic=223556&pid=918371 |
|
|
|
|
|
|
|
Users currently in here |
1 Anonymous
|
|
Powered by JForum - Extended by HVAOnline
hvaonline.net | hvaforum.net | hvazone.net | hvanews.net | vnhacker.org
1999 - 2013 ©
v2012|0504|218|
|
|