[原文]Multiple SQL injection vulnerabilities in digiSHOP 3.1.17 and earlier allow remote attackers to execute arbitrary SQL commands or obtain the full installation path via (1) the c parameter in cart.php and (2) unspecified search module parameters.
digiSHOP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the cart.php script not properly sanitizing user-supplied input to the 'c' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Upgrade to version 3.2.3 or higher, as it has been reported to fix this vulnerability. The vendor also states "that anyone who has a version of digiSHOP that has this issue can contact Sum Effect Software, Inc. support and have the
issue resolved at no charge."