This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.
References
Link | Resource |
---|---|
https://github.com/opencart/opencart/blob/3.0.3.9/upload/catalog/model/extension/payment/divido.php%23L114 | Product |
https://github.com/opencart/opencart/commit/46bd5f5a8056ff9aad0aa7d71729c4cf593d67e2 | Patch |
https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266565 | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-22 05:15
Updated : 2024-06-24 19:59
NVD link : CVE-2024-21514
Mitre link : CVE-2024-21514
CVE.ORG link : CVE-2024-21514
JSON object : View
Products Affected
opencart
- opencart
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')