Shop a la Cart Multiple Vulnerabilities
Posted on 02 September 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Shop a la Cart Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>======================================= Shop a la Cart Multiple Vulnerabilities ======================================= # Exploit Title: [Multiple vulnerabilities in SHOP A LA CART] # Date: [03.09.2010] # Author: [Ariko-Security] # Software Link: [http://shopalacart.com] # Version: [ALL] # Tested on: [ALL] # CVE : [n/a] # Ariko-Security: Security Audits , Audyt bezpiecze?stwa # Advisory: 728/2010 ============ { Ariko-Security - Advisory #1/9/2010 } ============= Multiple vulnerabilities in SHOP A LA CART Vendor's Description of Software: # http://shopalacart.com/shopping_cart_demo.php Dork: # N/A Application Info: # Name: SHOP A LA CART # ALL versions Vulnerability Info: # Type: multiple SQL injections, multiple XSS, multiple iFrame injections, multiple link injections, Time Table: # 20/08/2010 - Vendor notified. Fix: # n/a Input passed via the "xGrp" parameter to catgrp.php is not properly sanitised before being used in a SQL query. Input passed via the "xCat" parameter to catmain.php and prodmain.php is not properly sanitised before being used in a SQL query. Input passed to the "nLoginUser" ,"nCustPhone" parameters in account_signup.php is not properly sanitised before being returned to the user. Input passed to the "nReferrer" ,"Zipcode" parameters in cart.php is not properly sanitised before being returned to the user. Input passed to the "nPhone" ,"nMailName", "nFullName", "nEmail", "nComments" parameters in popup_contact.php is not properly sanitised before being returned to the user. Input passed to the "nEmail" parameter in process_email.php is not properly sanitised before being returned to the user. Input passed to the "xRef" parameter in customer_login.php is not properly sanitised before being returned to the user. Input passed to the "xProd", "xCat" parameter in prodmain.php is not properly sanitised before being returned to the user. Input passed to the "nSearch" parameter in search.php is not properly sanitised before being returned to the user. Solution: # Input validation of all vulnerable parameters should be corrected. Vulnerability samples: # http://[site]/cart.php?nReferrer=';</script><script>alert(XSS)</script> # http://[site]/catgrp.php?xGrp=[SQLi] # http://[site]/account_signup.php [POST] nUpdate=1&nCustName=&nCustEmail=test%40altoromutual.com&nEmailOptOut=1&nCustPhone=%22%27%3E%3CA+HREF %3D%22%2AAriko-Security.html%22%3EInjection%3C%2FA%3E&nLoginUser=&nLoginPass=&.x=0&.y=0 # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-02]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>