View Issue Details

IDProjectCategoryView StatusLast Update
0006623OXID eShop (all versions)5. ------ UpdateApp / Update ------public2017-06-23 12:08
ReporterBeckerEnterprises Assigned To 
PriorityhighSeveritycrashReproducibilityalways
Status closedResolutionopen 
Product Version4.10.3 / 5.3.3 
Summary0006623: UTF-8 update.php SQL Fehler bei Werten mit Anführungszeichen
DescriptionWenn in der oxconfig Werte mit einfachem Anführungszeichen vorhanden sind, kommt es zu einem SQL Fehler da die Werte nicht korrekt escaped werden.
Steps To ReproduceIn der oxconfig eine Zeile mit einem Wert von ' einfügen, Update starten.
Additional InformationIn Zeile 357 (_updateConfigValue) den Inhalt von $sVarVal escapen.
$oDB = oxDB::getInstance();
.. $oDB->escapeString($sVarVal) ..
TagsNo tags attached.
ThemeNot defined
BrowserNot defined
PHP VersionAll
Database VersionAll

Activities

QA

2017-04-26 10:38

administrator   ~0012050

Kindly enter bugs only in the english language for future references.

The default oxconfig Table does not by default have a quotation mark. Can you please let provide the entry in oxconfig that requires a quotation mark so that we can try reproducing the issue.
Thanks

BeckerEnterprises

2017-04-26 10:55

reporter   ~0012051

Its caused by a third party module (shoptimax shoptifind) but oxconfig is not only used by oxid, so every value is possible and the update script should take account.

QA

2017-04-26 11:33

administrator   ~0012052

Last edited: 2017-04-26 11:33

Since the error is caused by a third party module, a solution cannot be added to the Standard Shop.
Kindly contact the third party module provider(in this case Shoptimax) for a solution.

BeckerEnterprises

2017-04-26 12:19

reporter   ~0012053

Really, this is also a big security issue, easy to perform SQL injection.

It is reproducable with Theme Flow, just add an ' in theme configuration in the contact field. You can also add SQL Statemens, works great ;)

But I dont see that this is an issue with modules, the Script have to deal with every possible value.
User values used in any SQL Statement should be escaped, without exception otherwise it leads to vulnerability!

QA

2017-04-26 14:52

administrator   ~0012054

Thank you for your feedback. The instances of security issue or SQL injection are taking place in the Shop Admin page. In this case, the user has to have Admin access to the Shop inorder to make an SQL injection possible.
Kindly provide more information or any other scenario where this issue can be reproduced in the Shop.

QA

2017-05-10 15:18

administrator   ~0012082

If any security issue still persists, please follow the instructions mentioned in https://oxidforge.org/en/security.
Thanks!

QA

2017-06-23 12:08

administrator   ~0012134

In place of the reporter, I (MK) did send a mail to the security@.