OXID eShop 6.0.x before 6.0.5 and 6.1.x before 6.1.4 allows SQL Injection via a crafted URL, leading to full access by an attacker. This includes all shopping cart options, customer data, and the database. No interaction between the attacker and the victim is necessary.
References
Link | Resource |
---|---|
https://oxidforge.org/en/security-bulletin-2019-001.html | Vendor Advisory |
https://oxidforge.org/en/security-bulletin-2019-001.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://oxidforge.org/en/security-bulletin-2019-001.html - Vendor Advisory |
Information
Published : 2019-07-30 20:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13026
Mitre link : CVE-2019-13026
CVE.ORG link : CVE-2019-13026
JSON object : View
Products Affected
oxid-esales
- eshop
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')