Multiple SQL injection vulnerabilities in includes/classes/shopping_cart.php in Zen Cart 1.2.0 through 1.3.8a, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the id parameter when (1) adding or (2) updating the shopping cart.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31758 - Vendor Advisory | |
References | () http://www.gulftech.org/?node=research&article_id=00129-09042008 - Exploit | |
References | () http://www.osvdb.org/48346 - | |
References | () http://www.securityfocus.com/archive/1/496002/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/496032/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/31023 - | |
References | () http://www.zen-cart.com/forum/showthread.php?p=604473 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44917 - |
Information
Published : 2009-08-19 05:24
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6985
Mitre link : CVE-2008-6985
CVE.ORG link : CVE-2008-6985
JSON object : View
Products Affected
zen-cart
- zen_cart
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')