banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin new bugs và exploits osCommerce Input Validation Flaw in 'shopping_cart.php'  XML
  [Question]   osCommerce Input Validation Flaw in 'shopping_cart.php' 22/08/2006 23:58:13 (+0700) | #1 | 16991
[Avatar]
LeonHart
HVA Friend

Joined: 10/01/2003 11:11:52
Messages: 215
Location: Secret
Offline
[Profile] [PM]
Version(s): 2.2 Milestone 2
Description: A vulnerability was reported in osCommerce. A remote user can inject SQL commands.

The 'shopping_cart.php' script does not properly validate user-supplied input, as the magic quotes emulation implementation contains a flaw. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A remote user can exploit the tep_cache_also_purchased() function in 'cache.php' to determine whether files exist or not and determine the installation path.

James Bercegay of the GulfTech Security Research Team discovered this vulnerability.

The original advisory is available at:

http://www.gulftech.org/?node=research&article_id=00110-08172006
Impact: A remote user can execute SQL commands on the underlying database.

A remote user can determine the installation path and determine whether specified files exist on the target system.
Solution: The vendor has issued a fix (2.2 Milestone 2 060817 Update), available at:

http://www.oscommerce.com/solutions/downloads

The osCommerce advisory is available at:

http://forums.oscommerce.com/index.php?showtopic=223556&pid=918371
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
1 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|