Lucene search

K

cscart-sql.txt

🗓️ 03 Sep 2008 00:00:00Reported by James BercegayType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

CS-Cart <= 1.3.5 SQL Injection - Serious security risk in ecommerce php application, allows for unauthorized access and arbitrary data retrieval. Upgrade to latest version required

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`##########################################################  
# GulfTech Security Research September 02, 2008  
##########################################################  
# Vendor : CS-Cart.com  
# URL : http://www.cs-cart.com/  
# Version : CS-Cart <= 1.3.5  
# Risk : SQL Injection  
##########################################################  
  
  
Description:  
CS-Cart Cart is a full featured online ecommerce application written  
in php that allows users to build, run and promote an online store.  
There is unfortunately a fairly serious SQL Injection issue within  
CS-Cart that can be used to easily take over user and administrator  
accounts, as well as used to retrieve arbitrary data from the database.  
The CS-Cart team have released an updated version of CS-Cart to resolve  
this issue, and users should upgrade as soon as possible.  
  
  
SQL Injection:  
There is a fairly serious SQL Injection issue in CS-Cart that, as  
mentioned before, allows attackers to easily bypass authentication, or  
retrieve arbitrary data from the underlying database. The vulnerable  
code can be found in /core/user.php  
  
if (fn_get_cookie(AREA_NAME . '_user_id')) {  
$udata = db_get_row("SELECT user_id, user_type, tax_exempt, last_login,   
membership_status,  
membership_id FROM $db_tables[users] WHERE   
user_id='".fn_get_cookie(AREA_NAME . '_user_id')."'  
AND password='".fn_get_cookie(AREA_NAME . '_password')."'");  
fn_define('LOGGED_VIA_COOKIE', true);  
}  
  
At the time of discovering this issue the fn_get_cookie() function did  
nothing more than check if the specified cookie value was present, if  
it was then it returned the value. This of course allowed for an SQL  
Injection issue since an attacker can easily specify cookie data.  
  
cs_cookies[customer_user_id]=1'/*;  
  
For example an attacker could specify a cookie like the one shown above  
and successfully log in as the customer with the id of 1 without ever  
actually authenticating. Alternatively just about any data can be  
retrieved via this method also since the injection happens right in the  
middle of a select statement.  
  
  
  
Solution:  
An updated version of CS-Cart has been released to address these issues  
and users can upgrade by visiting the CS-Cart website.  
  
  
  
Credits:  
James Bercegay of the GulfTech Security Research Team  
  
  
  
Related Info:  
The original advisory can be found at the following location  
http://www.gulftech.org/?node=research&article_id=00128-09022008  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Sep 2008 00:00Current
7.4High risk
Vulners AI Score7.4
18
.json
Report