Description
Multiple SQL injection vulnerabilities in CandyPress (CP) 4.1.1.26, and earlier 4.1.x versions, allow remote attackers to execute arbitrary SQL commands via the (1) idProduct and (2) options parameters to (a) ajax/ajax_optInventory.asp, or the (2) recid parameter to (b) ajax/ajax_getBrands.asp.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by BugReport.IR · textwebappsasp
https://www.exploit-db.com/exploits/4988
References (8)
Core 8
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27454
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39939
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28662
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/4988
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0314
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/487058/100/0/threaded
Exploit x_refsource_confirm
http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&PN=1
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3600
Scores
EPSS
0.0086
EPSS Percentile
75.1%
Details
CWE
CWE-89
Status
published
Products (2)
shoppingtree/candypress_store
4.1
shoppingtree/candypress_store
4.1.1.26
Published
Feb 01, 2008
Tracked Since
Feb 18, 2026