Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Commerce)  >   osCommerce Vendors:   osCommerce
osCommerce Input Validation Flaw in 'shopping_cart.php' Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1016719
SecurityTracker URL:
CVE Reference:   CVE-2006-4297   (Links to External Site)
Updated:  Jun 5 2008
Original Entry Date:  Aug 18 2006
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.2 Milestone 2
Description:   A vulnerability was reported in osCommerce. A remote user can inject SQL commands.

The 'shopping_cart.php' script does not properly validate user-supplied input, as the magic quotes emulation implementation contains a flaw. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A remote user can exploit the tep_cache_also_purchased() function in 'cache.php' to determine whether files exist or not and determine the installation path.

James Bercegay of the GulfTech Security Research Team discovered this vulnerability.

The original advisory is available at:

Impact:   A remote user can execute SQL commands on the underlying database.

A remote user can determine the installation path and determine whether specified files exist on the target system.

Solution:   The vendor has issued a fix (2.2 Milestone 2 060817 Update), available at:

The osCommerce advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC