The Cart::getProducts method in system/library/cart.php in OpenCart 1.5.6.4 and earlier allows remote attackers to conduct server-side request forgery (SSRF) attacks or possibly conduct XML External Entity (XXE) attacks and execute arbitrary code via a crafted serialized PHP object, related to the quantity parameter in an update request.
References
Link | Resource |
---|---|
https://github.com/opencart-ce/opencart-ce/commit/c2aafc823bd85876f5e888f8ebc421069a5e076f | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/68529 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2014/Jul/67 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/127460/OpenCart-1.5.6.4-PHP-Object-Injection.html | Exploit Third Party Advisory VDB Entry |
http://karmainsecurity.com/KIS-2014-08 | Exploit Third Party Advisory |
http://www.securityfocus.com/archive/1/532763/100/0/threaded | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-03-20 14:29
Updated : 2019-04-25 11:37
NVD link : CVE-2014-3990
Mitre link : CVE-2014-3990
JSON object : View
CWE
Products Affected
opencart
- opencart