Description
|
|
Multiple vulnerabilities have been reported in CubeCart, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
1) Input passed to the "amount", "cartId", "email", "transId", and "transStatus" parameters in modules/gateway/WorldPay/return.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed via the "searchStr" parameter to index.php (when "_a" is set to "viewCat") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are reported in version 4.3.3. Other versions may also be affected.
|