Primo Cart user.php email Variable SQL Injection

2006-01-02T08:03:27
ID OSVDB:22146
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-01-02T08:03:27

Description

Vulnerability Description

Primo Cart contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the user.php script not properly sanitizing user-supplied input to the 'email' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Primo Cart contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the user.php script not properly sanitizing user-supplied input to the 'email' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/user.php?email=[SQL]&action=send-password-now

References:

Vendor URL: http://www.primoplace.com/primo-cart.htm Secunia Advisory ID:18264 Related OSVDB ID: 22147 Packet Storm: http://packetstormsecurity.org/0601-advisories/sa18264.txt Other Advisory URL: http://pridels.blogspot.com/2006/01/primo-cart-sql-inj.html CVE-2006-0068