CVE-2013-1465 – CubeCart 5.2.0 - 'cubecart.class.php' PHP Object Injection
https://notcve.org/view.php?id=CVE-2013-1465
The Cubecart::_basket method in classes/cubecart.class.php in CubeCart 5.0.0 through 5.2.0 allows remote attackers to unserialize arbitrary PHP objects via a crafted shipping parameter, as demonstrated by modifying the application configuration using the Config object. El método _basket en /classes / cubecart.class.php en CubeCart v5.0.0 a través de v5.2.0 permite a atacantes remotos desserializar objetos PHP a través de un parámetro envío hecho a mano, como se ha demostrado mediante la modificación de la configuración de la aplicación mediante el objeto Config. CubeCart versions 5.0.0 through 5.2.0 suffer from a PHP object injection vulnerability in cubecart.class.php. • https://www.exploit-db.com/exploits/24465 http://archives.neohapsis.com/archives/bugtraq/2013-02/0032.html http://forums.cubecart.com/?showtopic=47026 http://karmainsecurity.com/KIS-2013-02 http://osvdb.org/89923 http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html http://secunia.com/advisories/52072 http://www.exploit-db.com/exploits/24465 http://www.securityfocus.com/bid/57770 https://exchange.xforce.ibmcloud.com/vulnerabilities/81920 • CWE-502: Deserialization of Untrusted Data •
CVE-2012-0865 – CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect
https://notcve.org/view.php?id=CVE-2012-0865
Multiple open redirect vulnerabilities in CubeCart 3.0.20 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) r parameter to switch.php or (2) goto parameter to admin/login.php. Múltiples vulnerabilidades de redirección abierta en CubeCart v3.0.20 y anteriores permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarias y llevar a cabo ataques de phishing a través de una URL en el parámetro (1) r para switch.php o (2) el parámetro goto para admin / login. php. • https://www.exploit-db.com/exploits/36686 https://www.exploit-db.com/exploits/36685 https://www.exploit-db.com/exploits/36687 http://archives.neohapsis.com/archives/bugtraq/2012-02/0058.html http://osvdb.org/79140 http://osvdb.org/79141 http://www.openwall.com/lists/oss-security/2012/02/12/4 http://www.openwall.com/lists/oss-security/2012/02/13/5 http://www.openwall.com/lists/oss-security/2012/02/18/1 http://www.securityfocus.com/bid/51966 http: • CWE-20: Improper Input Validation •
CVE-2010-4903
https://notcve.org/view.php?id=CVE-2010-4903
SQL injection vulnerability in index.php in CubeCart 4.3.3 allows remote attackers to execute arbitrary SQL commands via the searchStr parameter. Vulnerabilidad de inyección SQL en index.php en CubeCart v4.3.3, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro searchStr. • http://secunia.com/advisories/41352 http://securityreason.com/securityalert/8441 http://www.acunetix.com/blog/web-security-zone/articles/sql-injection-xss-cubecart-4-3-3 http://www.securityfocus.com/archive/1/513572/100/0/threaded http://www.securityfocus.com/bid/43114 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2011-3724
https://notcve.org/view.php?id=CVE-2011-3724
CubeCart 4.4.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/shipping/USPS/calc.php and certain other files. CubeCart v4.4.3 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con modules/shipping/USPS/calc.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CubeCart-4.4.3 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2010-1931 – CubeCart PHP 4.3.x - 'shipkey' SQL Injection
https://notcve.org/view.php?id=CVE-2010-1931
SQL injection vulnerability in includes/content/cart.inc.php in CubeCart PHP Shopping cart 4.3.4 through 4.3.9 allows remote attackers to execute arbitrary SQL commands via the shipKey parameter to index.php. Vulnerabilidad de inyección SQL en includes/content/cart.inc.php en CubeCart PHP Shopping cart v4.3.4 hasta v4.3.9 permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro shipKey en index.php. • https://www.exploit-db.com/exploits/14117 http://forums.cubecart.com/index.php?showtopic=41469 http://osvdb.org/65250 http://secunia.com/advisories/40102 http://www.coresecurity.com/content/cubecart-php-shopping-cart-sql-injection http://www.securityfocus.com/archive/1/511735/100/0/threaded http://www.securityfocus.com/bid/40641 https://exchange.xforce.ibmcloud.com/vulnerabilities/59245 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •