1. OVERVIEW
The CubeCart 3.0.20 and lower versions are vulnerable to SQL Injection.
2. BACKGROUND
CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.
3. VULNERABILITY DESCRIPTION
Multiple parameters are not properly sanitized, which allows attacker
to conduct SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.
4. VERSIONS AFFECTED
3.0.20 and lower (aka 3.0.x family)
5. Affected URLs and Parameters
//cube/admin/products/extraCats.php (add parameter)
/cube/admin/products/index.php (cat_id parameter)
/cube/admin/products/index.php (category parameter)
/cube/admin/products/index.php (orderCol parameter)
/cube/admin/products/index.php (orderDir parameter)
/cube/admin/products/options.php (masterProduct parameter)
/cube/admin/settings/currency.php (active parameter)
6. SOLUTION
The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http:/cart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-12-22: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0x%5D_sqli
CubeCart Home Page: http://cubecart.com/
#yehg [2012-12-22]