CVE-2014-5140
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
03/01/2020
Last modified:
14/01/2020
Description
The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:loadedcommerce:loaded7:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html
- http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/
- http://www.exploit-db.com/exploits/34552
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95791
- https://github.com/loadedcommerce/loaded7/pull/520



