Korean
<< Back
VID 21953
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Zen Cart is vulnerable to an SQL injection vulnerability via the 'admin_email' parameter. Zen Cart is an open source e-commerce shopping cart system based on the PHP programming language and a MySQL database. Zen Cart version 1.2.6d and earlier versions are vulnerable to an SQL injection vulnerability, caused by improper filtering of user-supplied input passed to the 'admin_email' parameter of the 'admin/password_forgotten.php' script before using it in a database query. If the 'magic_quotes_gpc' option is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://secunia.com/advisories/17869/
http://www.frsirt.com/english/advisories/2005/2728
http://archives.neohapsis.com/archives/bugtraq/2005-12/0045.html
http://retrogod.altervista.org/zencart_126d_xpl.html
http://www.zencart.com/

* Platforms Affected:
Open Source, Zen Cart version 1.2.6d and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Zen Cart (1.2.7d or later), available from the Zen Cart Web page at http://www.zen-cart.com/modules/mydownloads/visit.php?lid=544
Related URL CVE-2005-3996 (CVE)
Related URL 15690 (SecurityFocus)
Related URL 23510 (ISS)