vendor:
ViArt Shop
by:
GulfTech Security Research
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: ViArt Shop
Affected Version From: 3.5
Affected Version To: 3.5
Patch Exists: YES
Related CWE: N/A
CPE: a:viart:viart_shop
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
ViArt Shop <= 3.5 SQL Injection Vulnerability
ViArt Shop is a full featured online ecommerce solution written in php. There is a high risk SQL Injection in ViArt that allows for an attacker to take over the ViArt installation. This vulnerability is present regardless of magic_quotes configuration. The vulnerable code can be found in 'products_rss.php' where the '$category_id' variable is never sanitized within the query, and is never sanitized prior to that point either. This allows for an attacker to easily select arbitrary data from the database such as usernames, passwords, and even credit card information. ViArt strips slashes from within the get_param() function, so magic_quotes does not prevent this SQL Injection from happening.
Mitigation:
Upgrade to the latest version of ViArt Shop.