CubeCart 3.0.x admin/print_order.php order_id Parameter SQL Injection

2006-09-26T00:00:00
ID EDB-ID:28698
Type exploitdb
Reporter HACKERS PAL
Modified 2006-09-26T00:00:00

Description

CubeCart 3.0.x admin/print_order.php order_id Parameter SQL Injection. CVE-2006-5107. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/20215/info
  
CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 
  
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
 
http://www.example.com/admin/print_order.php?order_id='%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,
27,28,29,30/*