CRITICALCVE-2024-4826CVSS 9.8

SQL injection vulnerability in Simple PHP Shopping Cart

翻訳中…

プラットフォーム

php

コンポーネント

simple-php-shopping-cart

修正版

0.9.1

AI Confidence: highNVDEPSS 0.2%レビュー済み: 2026年5月
あなたの言語に翻訳中…

A critical SQL injection vulnerability (CVE-2024-4826) has been identified in Simple PHP Shopping Cart versions 0.9. This flaw allows attackers to potentially extract sensitive data directly from the database. The vulnerability resides in the category.php file, specifically within the handling of the category_id parameter. Affected users should immediately upgrade to version 0.9.1 to mitigate this risk.

影響と攻撃シナリオ翻訳中…

The SQL injection vulnerability in Simple PHP Shopping Cart poses a significant threat to online stores utilizing this software. An attacker can exploit this flaw by crafting malicious SQL queries through the category_id parameter. Successful exploitation allows the attacker to bypass security measures and directly query the database. This can lead to the exfiltration of sensitive customer data, including usernames, passwords, credit card details, order history, and other personally identifiable information (PII). The attacker could also potentially modify or delete data, disrupting store operations and causing further damage. The blast radius extends to all users of the affected store, as their data is at risk.

悪用の状況翻訳中…

CVE-2024-4826 was publicly disclosed on May 16, 2024. While no known active exploitation campaigns have been reported at the time of writing, the vulnerability's critical severity and ease of exploitation make it a high-priority target. The lack of a public proof-of-concept does not diminish the risk, as attackers can readily develop their own exploits. This vulnerability is not currently listed on the CISA KEV catalog.

リスク対象者翻訳中…

Small to medium-sized online stores utilizing Simple PHP Shopping Cart, particularly those running older, unpatched installations. Shared hosting environments where multiple stores share the same database are at increased risk, as a successful attack on one store could potentially compromise others.

検出手順翻訳中…

• php: Examine the category.php file for unsanitized use of the category_id parameter. Search for SQL queries constructed using user-supplied input without proper escaping.

// Example of vulnerable code (simplified)
$sql = "SELECT * FROM categories WHERE id = " . $_GET['category_id'];

• generic web: Monitor web server access logs for requests containing unusual or malicious SQL syntax in the category_id parameter. Look for patterns indicative of SQL injection attempts.

grep -i "union select" /var/log/apache2/access.log

• database (mysql): Monitor MySQL query logs for suspicious SQL queries originating from the Simple PHP Shopping Cart application. Look for queries attempting to access sensitive tables or data.

SHOW PROCESSLIST; -- Check for long-running or unusual queries

攻撃タイムライン

  1. Disclosure

    disclosure

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出

EPSS

0.18% (39% パーセンタイル)

CISA SSVC

悪用状況none
自動化可能yes
技術的影響partial

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityLow悪用に必要な条件Privileges RequiredNone攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeUnchanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityHighサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
低 — 特別な条件不要。安定して悪用可能。
Privileges Required
なし — 認証不要。資格情報なしで悪用可能。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化なし — 影響は脆弱なコンポーネントのみ。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。

影響を受けるソフトウェア

コンポーネントsimple-php-shopping-cart
ベンダーAsaancart
影響範囲修正版
0.9 – 0.90.9.1

弱点分類 (CWE)

タイムライン

  1. 予約済み
  2. 公開日
  3. 更新日
  4. EPSS 更新日

緩和策と回避策翻訳中…

The primary mitigation for CVE-2024-4826 is to immediately upgrade Simple PHP Shopping Cart to version 0.9.1, which contains the necessary fix. If upgrading is not immediately feasible due to compatibility issues or downtime concerns, consider implementing temporary workarounds. Input validation and sanitization on the category_id parameter can help reduce the attack surface, though this is not a substitute for patching. Web application firewalls (WAFs) configured to detect and block SQL injection attempts can provide an additional layer of defense. Monitor database logs for suspicious SQL queries that might indicate an ongoing attack.

修正方法翻訳中…

Actualice a una versión parcheada o aplique las correcciones de seguridad proporcionadas por el proveedor. Implemente una validación y saneamiento adecuados de las entradas del usuario, especialmente el parámetro category_id en el archivo category.php, para prevenir la inyección SQL. Considere utilizar consultas preparadas o funciones de escape específicas de la base de datos para protegerse contra ataques de inyección SQL.

CVEセキュリティニュースレター

脆弱性分析と重要アラートをメールでお届けします。

よくある質問翻訳中…

What is CVE-2024-4826 — SQL Injection in Simple PHP Shopping Cart?

CVE-2024-4826 is a critical SQL injection vulnerability affecting Simple PHP Shopping Cart versions 0.9, allowing attackers to potentially extract database information.

Am I affected by CVE-2024-4826 in Simple PHP Shopping Cart?

Yes, if you are using Simple PHP Shopping Cart version 0.9, you are vulnerable to this SQL injection flaw. Upgrade to 0.9.1 immediately.

How do I fix CVE-2024-4826 in Simple PHP Shopping Cart?

The recommended fix is to upgrade to version 0.9.1. If upgrading is not possible, implement temporary workarounds like input validation and WAF rules.

Is CVE-2024-4826 being actively exploited?

While no active exploitation campaigns have been confirmed, the vulnerability's severity and ease of exploitation make it a likely target for attackers.

Where can I find the official Simple PHP Shopping Cart advisory for CVE-2024-4826?

Refer to the Simple PHP Shopping Cart project's official website or repository for the latest security advisories and updates.

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。