Reporter Aung Khant
The CubeCart 3.0.20 and lower versions are vulnerable to SQL Injection.
CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.
3. VULNERABILITY DESCRIPTION
Multiple parameters are not properly sanitized, which allows attacker
to conduct SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.
4. VERSIONS AFFECTED
3.0.20 and lower (aka 3.0.x family)
5. Affected URLs and Parameters
//cube/admin/products/extraCats.php (add parameter)
/cube/admin/products/index.php (cat_id parameter)
/cube/admin/products/index.php (category parameter)
/cube/admin/products/index.php (orderCol parameter)
/cube/admin/products/index.php (orderDir parameter)
/cube/admin/products/options.php (masterProduct parameter)
/cube/admin/settings/currency.php (active parameter)
The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.
CubeCart Development Team
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-12-22: Vulnerability disclosed
Original Advisory URL:
CubeCart Home Page: http://cubecart.com/
YGN Ethical Hacker Group
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd