Site icon Astra Security Blog

SQL Errors resulting in Sensitive Data Exposure in Journal OpenCart Theme < 3.1.0 - Update immediately

During the audit on an OpenCart website using the popular Journal theme, we were able to find that a particular endpoint is vulnerable to Sensitive Data Exposure through SQL errors. Journal version 3.1.0 fixing the issue was released on July 1, 2020.

CVE ID: CVE-2020-15478

Summary

Journal, the best selling OpenCart theme used in over 25K websites, was found to expose sensitive information and be potentially vulnerable to more attacks such as SQL Injection.

Sensitive Data Exposure, an OWASP Top 10 vulnerability, occurs when an application fails to adequately secure sensitive data. The information exposed can include passwords, session tokens, credit card data, private health data, and more.

Vulnerability

More details on the vulnerability will be added on July 15th so that theme users will have enough time to update to the latest version.

Update with technical details:

Due to the way the “page” parameter is typecast as an integer in /catalog/controller/journal3/blog.php, if someone enters a string, this results in a detailed error message showing SQL error, database details, and internal path.

Such information can help an attacker better prepare their attacks. We see that $page is type casted to an integer using $page = (int)Arr::get($this->request->get, 'page', 1); in the mentioned file.

Timeline

Vulnerability reported to the Journal team on June 11, 2020.
Version 3.1.0 containing the fix to the vulnerability was released on July 1, 2020.

Recommendation

if ($page == 0)
	{
	    $page=1;
	}

Reference

Exit mobile version