TomatoCart SQL Injection and Cross Site Scripting Vulnerabilities

Summary
This host is installed with TomatoCart and is prone to sql-injection and cross-site scripting.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site and inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will updated once the solution details are available. For updates refer http://www.tomatocart.com/
Insight
Multiple errors are due to, - Input passed to info.php script via the 'faqs_id' GET parameter is not validated before returning it to users - the program does not properly sanitize user-supplied input to the 'First Name' and 'Last Name' fields when creating new contacts.
Affected
TomatoCart version 1.1.8.6.1
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References