Description
|
|
Multiple vulnerabilities have been identified in Zen Cart, which could be exploited by remote attackers to compromise a vulnerable server.
The first issue is due to input validation errors in the "ipn_get_stored_session", "whos_online_session_recreate", and "add_cart" functions that fail to properly validate certain parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second vulnerability is due to an input validation error in the "index.php" script that does not validate the "autoLoadConfig[]" variable, which may be exploited by remote attackers to include local or remote scripts with the privileges of the web server.
The third flaw is due to an input validation error in the "index.php" script that does not validate the "typefilter" parameter, which may be exploited by remote attackers to include local scripts with the privileges of the web server.
|