[原文]Multiple SQL injection vulnerabilities in QuickEStore 7.9 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the OrderID parameter in (a) shipping.cfm and (b) checkout.cfm, (2) ItemID parameter in (c) proddetail.cfm, (3) SubCatID parameter in (d) index.cfm, the (4) CategoryID parameter in (e) prodpage.cfm, and (5) ProdID parameter in (f) Details.cfm. NOTE: these issues can also be exploited for path disclosure.
QuickEStore contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the prodpage.cfm script not properly sanitizing user-supplied input to the 'CategoryID' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Additionally, by providing a malformed file argument to the script it will disclose the full installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.