Ravens PHP Scripts

Eazy Cart Multiple Vulnerabilities
Date: Wednesday, October 11, 2006 @ 02:35:23 CDT
Topic: Security


SECUNIA ADVISORY ID: SA22286

VERIFY ADVISORY: http://secunia.com/advisories/22286/

CRITICAL: Moderately critical

IMPACT: Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information

WHERE: >From remote

SOFTWARE: Eazy Cart 2.x - http://secunia.com/product/12259/

DESCRIPTION: Some vulnerabilities have been discovered in Eazy Cart, which can be exploited by malicious people to bypass certain security restriction, disclose sensitive information, manipulate orders, and to conduct cross-site scripting attacks. The vulnerabilities have been confirmed in version 2.01. Other versions may also be affected.




1) An error exists in the authentication process of multiple files in the "admin" directory, which can be exploited to access the administrative interface.

2) Input passed to the "price" parameter in easycart.php is not properly verified before being used. This can e.g. be exploited to manipulate orders.

3) Input passed to various parameters in "easycart.php" is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Examples:
http://[host]/easycart.php?action=add&des=[code]
http://[host]/easycart.php?action=add&qty=[code]

4) Access to admin/config/customer.dat is not properly restricted and can be exploited to disclose customer information.

SOLUTION: Use another product.

PROVIDED AND/OR DISCOVERED BY:
1-3) Mayhemic Labs
4) Reported by an anonymous person.

ORIGINAL ADVISORY: http://www.mayhemiclabs.com/advisories/MHL-2006-01.txt






This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2453