header-logo
Suggest Exploit
vendor:
E-commerce Shopping Cart
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: E-commerce Shopping Cart
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: Unknown
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Shopstorenow E-commerce Shopping Cart SQL Injection Vulnerability

The Shopstorenow E-commerce Shopping Cart is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. An example of a potential exploit is: http://www.example.com/orange.asp?CatID=1'%20and%201=convert(int,(select%20top%201%20table_name%20from%20information_schema.tables))--sp_password

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate all user-supplied input before using it in SQL queries. Additionally, using parameterized queries or prepared statements can help prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21905/info

Shopstorenow E-commerce Shopping Cart is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/orange.asp?CatID=1'%20and%201=convert(int,(select%20top%201%20table_name%20from%20information_schema.tables))--sp_password