ESMI PayPal Storefront Cross-Site Scripting Vulnerability
BID:12904
Info
ESMI PayPal Storefront Cross-Site Scripting Vulnerability
| Bugtraq ID: | 12904 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 26 2005 12:00AM |
| Updated: | Mar 26 2005 12:00AM |
| Credit: | Credited to Dcrab <[email protected]>. |
| Vulnerable: |
ESMI PayPal Storefront 1.7 |
| Not Vulnerable: | |
Discussion
ESMI PayPal Storefront Cross-Site Scripting Vulnerability
ESMI PayPal Storefrom is affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
ESMI PayPal Storefrom is affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
ESMI PayPal Storefront Cross-Site Scripting Vulnerability
No exploit is required.
The following proof of concept was supplied:
http://www.example.com/hv/ecdis/products1h.php?id=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&id2=10&subcat=Asus&p=products1
No exploit is required.
The following proof of concept was supplied:
http://www.example.com/hv/ecdis/products1h.php?id=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&id2=10&subcat=Asus&p=products1
Solution / Fix
ESMI PayPal Storefront Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.