<![CDATA[Latest posts for the topic "osCommerce Input Validation Flaw in 'shopping_cart.php'"]]> /hvaonline/posts/list/13.html JForum - http://www.jforum.net osCommerce Input Validation Flaw in 'shopping_cart.php' Version(s): 2.2 Milestone 2 Description: A vulnerability was reported in osCommerce. A remote user can inject SQL commands. The 'shopping_cart.php' script does not properly validate user-supplied input, as the magic quotes emulation implementation contains a flaw. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database. A remote user can exploit the tep_cache_also_purchased() function in 'cache.php' to determine whether files exist or not and determine the installation path. James Bercegay of the GulfTech Security Research Team discovered this vulnerability. The original advisory is available at: http://www.gulftech.org/?node=research&article_id=00110-08172006 Impact: A remote user can execute SQL commands on the underlying database. A remote user can determine the installation path and determine whether specified files exist on the target system. Solution: The vendor has issued a fix (2.2 Milestone 2 060817 Update), available at: http://www.oscommerce.com/solutions/downloads The osCommerce advisory is available at: http://forums.oscommerce.com/index.php?showtopic=223556&pid=918371]]> /hvaonline/posts/list/3036.html#16991 /hvaonline/posts/list/3036.html#16991 GMT