Miggo Logo

CVE-2021-37823: OpenCart SQL injection vulnerability

4.9

CVSS Score
3.1

Basic Information

EPSS Score
0.16287%
Published
11/3/2022
Updated
9/7/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
opencart/opencartcomposer<= 3.0.3.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the backup/restore functionality where user-supplied SQL file content is directly executed. The Medium article demonstrates SQL injection via modified backup files containing updatexml payloads. This indicates the restore handler executes raw SQL without proper sanitization. The controller structure follows OpenCart's convention where admin maintenance features are typically located in admin/controller/tool/backup.php. The high confidence comes from direct correlation between described attack vector (file restore), SQL execution behavior, and CWE-89 classification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Op*n**rt *.*.*.* *llows us*rs to o*t*in **t***s* in*orm*tion or r*** s*rv*r *il*s t*rou** SQL inj**tion in t** ***k*roun*.

Reasoning

T** vuln*r**ility m*ni**sts in t** `***kup/r*stor*` *un*tion*lity w**r* us*r-suppli** SQL *il* *ont*nt is *ir**tly *x**ut**. T** M**ium *rti*l* **monstr*t*s SQL inj**tion vi* mo*i*i** ***kup *il*s *ont*inin* `up**t*xml` p*ylo**s. T*is in*i**t*s t** r