CVE-2015-9226

HIGH

Alegrocart - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in AlegroCart 1.2.8 allow remote administrators to execute arbitrary SQL commands via the download parameter in the (1) check_download and possibly (2) check_filename function in upload/admin2/model/products/model_admin_download.php or remote authenticated users with a valid Paypal transaction token to execute arbitrary SQL commands via the ref parameter in the (3) orderUpdate function in upload/catalog/extension/payment/paypal.php.

Exploits (1)

exploitdb WORKING POC
by Curesec Research Team · textwebappsphp
https://www.exploit-db.com/exploits/38727

References (4)

Core 4
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/134362/AlegroCart-1.2.8-SQL-Injection.html
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/38727/
Exploit, Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Nov/68

Scores

CVSS v3 7.2
EPSS 0.0175
EPSS Percentile 82.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (1)
alegrocart/alegrocart 1.2.8
Published Sep 11, 2017
Tracked Since Feb 18, 2026