Files
CVEs-PoC/2014/CVE-2014-5140.md
T
2024-06-18 02:51:15 +02:00

20 lines
943 B
Markdown

### [CVE-2014-5140](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5140)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
### POC
#### Reference
- http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html
- http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/
- http://www.exploit-db.com/exploits/34552
#### Github
No PoCs found on GitHub currently.