icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Cubecart < 3.0.17 cart.inc.php Multiple Parameter SQL Injection

Medium

Synopsis

The remote host is vulnerable to a SQL Injection attack.

Description

The version of CubeCart installed on the remote host fails to properly sanitize user-supplied input to the 'options' parameter before using it in /include/path/cart.inc.php. An unauthenticated remote attacker may be able to exploit this issue to execute arbitrary SQL commands on the remote database server. An attacker exploiting this flaw would only need to be able to send HTTP requests to the Cubecart application.

Solution

Upgrade to version 3.0.17 or higher.