Cubecart < 3.0.17 Multiple Parameter SQL Injection

Medium Nessus Network Monitor Plugin ID 4002


The remote host is vulnerable to a SQL Injection attack.


The version of CubeCart installed on the remote host fails to properly sanitize user-supplied input to the 'options' parameter before using it in /include/path/ An unauthenticated remote attacker may be able to exploit this issue to execute arbitrary SQL commands on the remote database server. An attacker exploiting this flaw would only need to be able to send HTTP requests to the Cubecart application.


Upgrade to version 3.0.17 or higher.

See Also

Plugin Details

Severity: Medium

ID: 4002

File Name: 4002.prm

Family: CGI

Published: 2004/08/18

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 6.3

Temporal Score: 5.9


Temporal Vector: CVSS3#E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:cubecart:cubecart

Reference Information

CVE: CVE-2007-2862

BID: 24100

OSVDB: 38100