QuickEStore checkout.cfm OrderID Variable SQL Injection

2006-04-25T09:32:34
ID OSVDB:24979
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-04-25T09:32:34

Description

Vulnerability Description

QuickEStore contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the checkout.cfm script not properly sanitizing user-supplied input to the 'OrderID' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Additionally, by providing a malformed file argument to the script it will disclose the full installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

QuickEStore contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the checkout.cfm script not properly sanitizing user-supplied input to the 'OrderID' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Additionally, by providing a malformed file argument to the script it will disclose the full installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Manual Testing Notes

/checkout.cfm?CFID=&CFTOKEN=&OrderID=[SQL]

References:

Vendor URL: http://www.quickestore.com/ Secunia Advisory ID:19817 Related OSVDB ID: 24978 Related OSVDB ID: 24976 Related OSVDB ID: 24977 Related OSVDB ID: 24980 Other Advisory URL: http://pridels.blogspot.com/2006/04/quickestore-79-vuln.html FrSIRT Advisory: ADV-2006-1514 CVE-2006-2053