Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jq73-v9pp-jgx4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

EPSS

Процентиль: 78%
0.01106
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
около 6 лет назад

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

EPSS

Процентиль: 78%
0.01106
Низкий