Summary
This host is installed with UAEPD Shopping Cart and is prone to multiple sql injection vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary SQL statements on the vulnerable system, which may leads to access or modify data in the underlying database.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Flaws is due to the products.php script does not validate input to the 'cat_id' and 'p_id' parameters and page.php and news.php scripts are not validating input passed via 'id' parameter before using in sql query
Affected
UAEPD Shopping Script.
Detection
Send a crafted data via HTTP GET request and check whether it is able to execute sql query or not.
References
Severity
Classification
-
CVE CVE-2014-1618 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object Remote Code Execution
- Apache Struts2 Showcase Arbitrary Java Method Execution vulnerability
- Apache Struts ClassLoader Manipulation Vulnerabilities
- ATutor password reminder SQL injection