vendor:
Infor Storefront
by:
ratboy
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Infor Storefront
Affected Version From: Infor Storefront
Affected Version To: Infor Storefront
Patch Exists: NO
Related CWE: N/A
CPE: a:insitesoft:infor_storefront
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows All Versions
2020
Infor Storefront B2B 1.0 – ‘usr_name’ SQL Injection
Infor Storefront B2B 1.0 is vulnerable to SQL injection via the 'usr_name' and 'itm_id' parameters. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a SQL injection payload. This can be done by appending a single quote character followed by a semicolon and a double dash to the end of the parameter value. This will cause the application to execute the malicious payload, allowing an attacker to gain access to the underlying database.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.