SQL injection vulnerability in EC-CUBE Ver2 2.1.2a and earlier, and Ver2 RC 2.3.0-rc1 and earlier, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/31509 | vdb entry |
http://jvn.jp/en/jp/JVN81111541/index.html | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45593 | vdb entry |
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000065.html | third party advisory |
http://secunia.com/advisories/32065 | third party advisory vendor advisory |
http://www.ec-cube.net/info/080829 | patch |