The CubeCart 4.4.6 and lower versions are vulnerable to SQL Injection.
CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.
Multiple parameters are not properly sanitized, which allows attacker
to conduct SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.
4.4.6 and lower
/admin.php (active parameter)
/admin.php (cat_id parameter)
/admin.php (orderCol parameter)
/admin.php (orderDir parameter)
The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.
CubeCart Development Team
http://cubecart.com/
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_sqli
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd