This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.
References
Link | Resource |
---|---|
https://github.com/opencart/opencart/blob/3.0.3.9/upload/catalog/model/extension/payment/divido.php%23L114 | Product |
https://github.com/opencart/opencart/commit/46bd5f5a8056ff9aad0aa7d71729c4cf593d67e2 | Patch |
https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266565 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2024-06-22T05:00:04.158Z
Updated: 2024-06-24T14:59:33.559Z
Reserved: 2023-12-22T12:33:20.120Z
Link: CVE-2024-21514
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-06-22T05:15:09.637
Modified: 2024-06-24T19:59:16.767
Link: CVE-2024-21514
JSON object: View
Redhat Information
No data.
CWE