Description
The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-5038 | The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:34:37.518Z
Reserved: 2014-07-30T00:00:00.000Z
Link: CVE-2014-5140
No data.
Status : Modified
Published: 2020-01-03T20:15:11.730
Modified: 2024-11-21T02:11:29.817
Link: CVE-2014-5140
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD