ID CVE-2005-4614 Type cve Reporter cve@mitre.org Modified 2017-07-20T01:29:00
Description
Multiple SQL injection vulnerabilities in digiSHOP 3.1.17 and earlier allow remote attackers to execute arbitrary SQL commands or obtain the full installation path via (1) the c parameter in cart.php and (2) unspecified search module parameters.
{"osvdb": [{"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-4614"], "edition": 1, "description": "## Vulnerability Description\ndigiSHOP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the cart.php script not properly sanitizing user-supplied input to the 'c' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Technical Description\nUsing a crafted failed SQL query, an attacker may also be able to disclose the installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.\n## Solution Description\nUpgrade to version 3.2.3 or higher, as it has been reported to fix this vulnerability. The vendor also states \"that anyone who has a version of digiSHOP that has this issue can contact Sum Effect Software, Inc. support and have the\nissue resolved at no charge.\"\n## Short Description\ndigiSHOP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the cart.php script not properly sanitizing user-supplied input to the 'c' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Manual Testing Notes\n/cart.php?m=product_list&c=[SQL]\n## References:\nVendor URL: http://digishop.sumeffect.com/\n[Related OSVDB ID: 21303](https://vulners.com/osvdb/OSVDB:21303)\nOther Advisory URL: http://pridels.blogspot.com/2005/11/digishop-3x-sql-injection-vuln.html\nISS X-Force ID: 23357\nISS X-Force ID: 23358\n[CVE-2005-4614](https://vulners.com/cve/CVE-2005-4614)\n", "modified": "2005-11-23T21:54:42", "published": "2005-11-23T21:54:42", "href": "https://vulners.com/osvdb/OSVDB:21302", "id": "OSVDB:21302", "title": "digiSHOP cart.php c Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-4614"], "edition": 1, "description": "## Vulnerability Description\ndigiSHOP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search query not properly sanitizing user-supplied input to unspecified variable(s). This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Technical Description\nUsing a crafted failed SQL query, an attacker may also be able to disclose the installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\ndigiSHOP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search query not properly sanitizing user-supplied input to unspecified variable(s). This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## References:\nVendor URL: http://digishop.sumeffect.com/\n[Related OSVDB ID: 21302](https://vulners.com/osvdb/OSVDB:21302)\nOther Advisory URL: http://pridels.blogspot.com/2005/11/digishop-3x-sql-injection-vuln.html\nISS X-Force ID: 23357\nISS X-Force ID: 23358\nFrSIRT Advisory: ADV-2005-2563\n[CVE-2005-4614](https://vulners.com/cve/CVE-2005-4614)\n", "modified": "2005-11-23T21:54:42", "published": "2005-11-23T21:54:42", "href": "https://vulners.com/osvdb/OSVDB:21303", "id": "OSVDB:21303", "title": "digiSHOP Search Query SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}