Home / os / win7

Shop a la Cart Multiple Vulnerabilities

Posted on 02 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Shop a la Cart Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>======================================= Shop a la Cart Multiple Vulnerabilities ======================================= # Exploit Title: [Multiple vulnerabilities in SHOP A LA CART] # Date: [03.09.2010] # Author: [Ariko-Security] # Software Link: [http://shopalacart.com] # Version: [ALL] # Tested on: [ALL] # CVE : [n/a] # Ariko-Security: Security Audits , Audyt bezpiecze?stwa # Advisory: 728/2010 ============ { Ariko-Security - Advisory #1/9/2010 } ============= Multiple vulnerabilities in SHOP A LA CART Vendor's Description of Software: # http://shopalacart.com/shopping_cart_demo.php Dork: # N/A Application Info: # Name: SHOP A LA CART # ALL versions Vulnerability Info: # Type: multiple SQL injections, multiple XSS, multiple iFrame injections, multiple link injections, Time Table: # 20/08/2010 - Vendor notified. Fix: # n/a Input passed via the &quot;xGrp&quot; parameter to catgrp.php is not properly sanitised before being used in a SQL query. Input passed via the &quot;xCat&quot; parameter to catmain.php and prodmain.php is not properly sanitised before being used in a SQL query. Input passed to the &quot;nLoginUser&quot; ,&quot;nCustPhone&quot; parameters in account_signup.php is not properly sanitised before being returned to the user. Input passed to the &quot;nReferrer&quot; ,&quot;Zipcode&quot; parameters in cart.php is not properly sanitised before being returned to the user. Input passed to the &quot;nPhone&quot; ,&quot;nMailName&quot;, &quot;nFullName&quot;, &quot;nEmail&quot;, &quot;nComments&quot; parameters in popup_contact.php is not properly sanitised before being returned to the user. Input passed to the &quot;nEmail&quot; parameter in process_email.php is not properly sanitised before being returned to the user. Input passed to the &quot;xRef&quot; parameter in customer_login.php is not properly sanitised before being returned to the user. Input passed to the &quot;xProd&quot;, &quot;xCat&quot; parameter in prodmain.php is not properly sanitised before being returned to the user. Input passed to the &quot;nSearch&quot; parameter in search.php is not properly sanitised before being returned to the user. Solution: # Input validation of all vulnerable parameters should be corrected. Vulnerability samples: # http://[site]/cart.php?nReferrer=';&lt;/script&gt;&lt;script&gt;alert(XSS)&lt;/script&gt; # http://[site]/catgrp.php?xGrp=[SQLi] # http://[site]/account_signup.php [POST] nUpdate=1&amp;nCustName=&amp;nCustEmail=test%40altoromutual.com&amp;nEmailOptOut=1&amp;nCustPhone=%22%27%3E%3CA+HREF %3D%22%2AAriko-Security.html%22%3EInjection%3C%2FA%3E&amp;nLoginUser=&amp;nLoginPass=&amp;.x=0&amp;.y=0 # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-02]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP