Short Name |
HTTP:SQL:INJ:OSCOM |
---|---|
Severity |
Warning |
Recommended |
No |
Category |
HTTP |
Keywords |
osCommerce products_id Parameter SQL Injection |
Release Date |
2004/09/01 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known SQL injection vulnerability in a script supplied as part of the osCommerce product. Attackers can submit an HTTP request that contains a maliciously formed "products_id" parameter to create a denial-of-service (DoS)condition.
It has been reported that one of the scripts included with osCommerce fails to validate user-supplied input, rendering it vulnerable to a SQL injection attack. It has been reported that an attacker may supply malicious SQL queries as a URI parameter to the affected script. The attacker may leverage this condition to manipulate the logic and structure of database queries, possibly resulting in osCommerce compromise, information disclosure or other consequences.