CubeCart Cross-Site Scripting Vulnerabilities

Posted on Friday, September 29, 2006 @ 03:30:34 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA22175

VERIFY ADVISORY: http://secunia.com/advisories/22175/

CRITICAL: Less critical

IMPACT: Cross Site Scripting

WHERE: >From remote

SOFTWARE: CubeCart 2.x - http://secunia.com/product/4021/

DESCRIPTION: HACKERS PAL has discovered some vulnerabilities in CubeCart, which can be exploited by malicious people to conduct cross-site scripting attacks. Some input isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Examples:
http://[host]/admin/nav.php?site_url=[code]
http://[host]/admin/nav.php?la_search_home=[code]
http://[host]/admin/header.inc.php?site_name=[code]
http://[host]/admin/header.inc.php?la_adm_header=[code]
http://[host]/admin/header.inc.php?charset=[code]
http://[host]/footer.inc.php?la_pow_by=[code]
Successful exploitation requires that "register_globals" is enabled. The vulnerabilities have been confirmed in version 2.0.7. Other versions may also be affected.
SOLUTION: The 3.x branch is not affected by the vulnerabilities. Edit the source code to ensure that input is properly sanitised. Set "register_globals" to "Off".
PROVIDED AND/OR DISCOVERED BY: HACKERS PAL
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,234,083
  • Today: 46,336
Server InfoServer Info
  • Apr 24, 2025
  • 04:44 am CDT