
Cloud Vulnerability DB
A community-led vulnerabilities database
OpenCart 3.0.3.7 contains a SQL injection vulnerability that allows authenticated users with admin access to obtain database information or read server files through SQL injection in the background (Medium Blog). The vulnerability was discovered in July 2021 and assigned CVE-2021-37823 (NVD).
The vulnerability exists in the backup/restore functionality of OpenCart's admin panel. An authenticated admin user can exploit this by uploading a maliciously crafted SQL file containing payloads like 'updatexml()' or time-based injection techniques through the system maintenance restore feature. The vulnerability has a CVSS v3.1 base score of 4.9 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N (NVD).
Successful exploitation allows attackers to obtain sensitive database information or read server files through SQL injection techniques like LOAD_FILE(). The vulnerability primarily impacts data confidentiality, allowing unauthorized access to database contents and potentially sensitive server files (Medium Blog).
Users should upgrade to a version newer than OpenCart 3.0.3.7 that contains fixes for this vulnerability. Additionally, access to admin panel functionality should be strictly limited and monitored (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."