First published: Tue Aug 18 2009(Updated: )
Multiple SQL injection vulnerabilities in includes/classes/shopping_cart.php in Zen Cart 1.2.0 through 1.3.8a, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the id parameter when (1) adding or (2) updating the shopping cart.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | =1.3.8a | |
Zen Cart | =1.3.2 | |
Zen Cart | =1.2.4.1 | |
Zen Cart | =1.2.1d | |
Zen Cart | =1.2.3d | |
Zen Cart | =1.3.6 | |
Zen Cart | =1.2.1_patch1 | |
Zen Cart | =1.2.6d | |
Zen Cart | =1.3.7 | |
Zen Cart | =1.3.8 | |
Zen Cart | =1.2.0d | |
Zen Cart | =1.2.4d | |
Zen Cart | =1.2.5d | |
Zen Cart | =1.3 | |
Zen Cart | =1.2.2d | |
Zen Cart | =1.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6985 is classified as a high severity vulnerability due to the potential for unauthorized SQL command execution.
To mitigate CVE-2008-6985, it is recommended to patch Zen Cart to the latest version that addresses these SQL injection vulnerabilities.
CVE-2008-6985 affects Zen Cart versions from 1.2.0 to 1.3.8a, particularly when magic_quotes_gpc is disabled.
Yes, remote attackers can exploit CVE-2008-6985 to execute arbitrary SQL commands through manipulation of the id parameter.
SQL injection vulnerabilities, like CVE-2008-6985, allow attackers to interfere with the queries that an application makes to its database.