The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/34552 | Exploit Third Party Advisory VDB Entry |
http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/ | Patch Third Party Advisory |
https://github.com/loadedcommerce/loaded7/pull/520 | Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95791 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-01-03 12:15
Updated : 2020-01-14 13:26
NVD link : CVE-2014-5140
Mitre link : CVE-2014-5140
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
loadedcommerce
- loaded7