vendor:
OpenCart
by:
Saadat Ullah
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: OpenCart
Affected Version From: 1.5.6.1
Affected Version To: 1.5.6.1
Patch Exists: YES
Related CWE: N/A
CPE: a:opencart:opencart
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.2.15 PHP/5.3.3
2014
OpenCart <= 1.5.6.1 SQL Injection
OpenCart suffers from multiple SQL injection vulnerabilities in ebay.php, which is more about privilege escalation as attackers may need openbay module access. Poorly coded file full of SQLi opencart/system/library/ebay.php, where product_id is used in a SQL query without being sanitized. The function is called on many locations and parameter is passed without sanitizing. In opencart/admin/controller/openbay/openbay.php, public function editLoad() is vulnerable, where $this->request->get['product_id'] is coming from GET field. Similarly, public function isEbayOrder($id) and public function getProductStockLevel($productId, $sku = '') are also vulnerable.
Mitigation:
Sanitize user input and use prepared statements to prevent SQL injection.