CVE-2010-4633

HIGH7.5/ 10.0
Share:
Published: December 30, 2010 at 09:00 PM
Modified: April 11, 2025 at 12:51 AM
Source: cve@mitre.org

Vulnerability Description

SQL injection vulnerability in cart.php in digiSHOP 2.0.2 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vulnerability than CVE-2005-4614.1.

CVSS Metrics

Base Score
7.5
Severity
HIGH
Vector String
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

digiSHOP 2.0.2 is vulnerable to a critical SQL injection flaw, allowing attackers to execute arbitrary SQL commands. This vulnerability, accessible through the cart.php script, could lead to complete database compromise, enabling data theft, system takeover, and potential business disruption.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: An attacker crafts a malicious SQL injection payload designed to exploit the vulnerability in cart.php. This payload is crafted to manipulate the SQL query executed by the application. Step 2: Request Submission: The attacker submits the crafted payload via an HTTP GET or POST request to cart.php, specifically targeting the id parameter (e.g., cart.php?id=PAYLOAD). Step 3: Query Execution: The vulnerable cart.php script receives the request and incorporates the attacker's payload directly into an SQL query without proper sanitization. Step 4: Database Interaction: The database server executes the modified SQL query, which now includes the attacker's malicious code. Step 5: Data Exfiltration/Manipulation: Depending on the payload, the attacker can then perform actions such as retrieving sensitive data (e.g., usernames, passwords, credit card details), modifying data, or even gaining control of the underlying system.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization of the id parameter within the cart.php script. Specifically, the application directly incorporates user-supplied input into SQL queries without escaping special characters or employing parameterized queries. This allows an attacker to inject malicious SQL code, which is then executed by the database server. The root cause is the absence of secure coding practices, specifically the failure to validate and sanitize user-supplied data before incorporating it into database queries. The application trusts the id parameter without verification, making it susceptible to SQL injection attacks.

CVE-2010-4633 - HIGH Severity (7.5) | Free CVE Database | 4nuxd