GHSA-7crj-24g3-g7h7

Suggest an improvement
Source
https://github.com/advisories/GHSA-7crj-24g3-g7h7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-7crj-24g3-g7h7/GHSA-7crj-24g3-g7h7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7crj-24g3-g7h7
Aliases
Published
2024-06-22T06:30:36Z
Modified
2024-06-25T02:34:23.617749Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
SQL injection in opencart
Details

This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.

Database specific
{
    "nvd_published_at": "2024-06-22T05:15:09Z",
    "cwe_ids": [
        "CWE-89"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-24T20:30:49Z"
}
References

Affected packages

Packagist / opencart/opencart

Package

Name
opencart/opencart
Purl
pkg:composer/opencart/opencart

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.0.3.9

Affected versions

2.*

2.2.0.0
2.3.0.0
2.3.0.1
2.3.0.2

3.*

3.0.0.0
3.0.0.2
3.0.1.1
3.0.1.2
3.0.2.0
3.0.3.0
3.0.3.1
3.0.3.2
3.0.3.3
3.0.3.4
3.0.3.5
3.0.3.6
3.0.3.7
3.0.3.8
3.0.3.9