发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:47:39

[原文]Multiple SQL injection vulnerabilities in Valdersoft Shopping Cart 3.0 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to category.php, (2) the id parameter to item.php, (3) the lang parameter to index.php, (4) the searchQuery parameter to search_result.php, (5) or the searchTopCategoryID parameter to search_result.php.

[CNNVD]Valdersoft Shopping CartSQL注入漏洞(CNNVD-200505-073)

        Valdersoft Shopping Cart 3.0存在多个SQL注入漏洞,允许远程攻击者通过(1)category.php的id参数,(2)item.php的id参数,(3)index.php的lang参数,(4)search_result.php的searchQuery参数,(5)或search_result.php的searchTopCategoryID参数来执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  SECTRACK  1013565
(VENDOR_ADVISORY)  BUGTRAQ  20050327 Multiple sql injection, and xss vulnerabilities in Vladersoft Shopping Cart v.3.0

- 漏洞信息

Valdersoft Shopping CartSQL注入漏洞
高危 SQL注入
2005-05-02 00:00:00 2005-10-20 00:00:00
        Valdersoft Shopping Cart 3.0存在多个SQL注入漏洞,允许远程攻击者通过(1)category.php的id参数,(2)item.php的id参数,(3)index.php的lang参数,(4)search_result.php的searchQuery参数,(5)或search_result.php的searchTopCategoryID参数来执行任意SQL命令。

- 公告与补丁


- 漏洞信息

Valdersoft Shopping Cart category.php id Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Valdersoft Shopping Cart contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the 'id' variable in the category.php script is not verified properly and will allow an attacker to inject or manipulate SQL queries.

- 时间线

2005-03-27 Unknow
2005-03-27 Unknow

- 解决方案

Upgrade to version 3.0 or higher, obtained from the vendor site on or after March 30, 2005, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. NOTE: The vendor has fixed the vulnerability without changing the version number.

- 相关参考

- 漏洞作者