Description
Multiple SQL injection vulnerabilities in the administrative backend in ZeusCart 4 allow remote administrators to execute arbitrary SQL commands via the id parameter in a (1) disporders detail or (2) subadminmgt edit action or (3) cid parameter in an editcurrency action to admin/.
Exploits (1)
References (8)
Core 8
Core References
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2015/q1/727
Exploit x_refsource_misc
http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/72761
Exploit mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2015/q1/649
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36159
Exploit x_refsource_misc
http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Feb/89
Issue Tracking x_refsource_misc
https://github.com/ZeusCart/zeuscart/issues/28
Scores
EPSS
0.0386
EPSS Percentile
88.3%
Details
CWE
CWE-89
Status
published
Products (1)
zeuscart/zeuscart
4.0
Published
Mar 10, 2015
Tracked Since
Feb 18, 2026