Zen Cart 1.3.8a, 1.3.8, and earlier does not require administrative authentication for admin/sqlpatch.php, which allows remote attackers to execute arbitrary SQL commands via the query_string parameter in an execute action, in conjunction with a PATH_INFO of password_forgotten.php, related to a "SQL Execution" issue.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/35550 | Vendor Advisory | 
| http://www.exploit-db.com/exploits/9005 | |
| http://www.osvdb.org/55343 | |
| http://www.securityfocus.com/bid/35468 | Exploit Patch | 
| http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 | Patch Vendor Advisory | 
| http://www.zen-cart.com/forum/showthread.php?t=130161 | Patch | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51317 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2009-06-30 10:30
Updated : 2017-09-19 01:29
NVD link : CVE-2009-2254
Mitre link : CVE-2009-2254
CVE.ORG link : CVE-2009-2254
JSON object : View
Products Affected
                zen-cart
- zen_cart
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
