The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
References
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/ - Patch, Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/34552 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95791 - Third Party Advisory, VDB Entry | |
References | () https://github.com/loadedcommerce/loaded7/pull/520 - Patch, Third Party Advisory |
Information
Published : 2020-01-03 20:15
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5140
Mitre link : CVE-2014-5140
CVE.ORG link : CVE-2014-5140
JSON object : View
Products Affected
loadedcommerce
- loaded7
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')