CVE-2024-21514

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21514
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21514.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21514
Aliases
Published
2024-06-22T05:15:09Z
Modified
2024-10-08T04:00:27.865776Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.

References

Affected packages

Git / github.com/opencart/opencart

Affected ranges

Type
GIT
Repo
https://github.com/opencart/opencart
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.0.0.0
2.0.1.0
2.0.1.1
2.0.2.0
2.0.3.0
2.0.3.1
2.1.0.0
2.1.0.1
2.2.0.0
2.3.0.0
2.3.0.1
2.3.0.2

3.*

3.0.0.0
3.0.0.2
3.0.1.1
3.0.1.2
3.0.2.0
3.0.3.0
3.0.3.1
3.0.3.2
3.0.3.3
3.0.3.4
3.0.3.5
3.0.3.6
3.0.3.7
3.0.3.8
3.0.3.9