OSCommerce Multiple Input Validation Vulnerabilities
BID:21477
Info
OSCommerce Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21477 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 07 2006 12:00AM |
| Updated: | Dec 07 2006 08:39PM |
| Credit: | Lostmon reported this issue. |
| Vulnerable: |
osCommerce osCommerce 3.0a3 |
| Not Vulnerable: | |
Discussion
OSCommerce Multiple Input Validation Vulnerabilities
osCommerce is prone to multiple input-validation vulnerabilities, including a directory-traversal issue and multiple cross-site scripting issues.
An attacker can exploit these issues to view sensitive information and to steal cookie-based authentication credentials. Other attacks are also possible.
Version 3.0a3 is vulnerable to this issue; other versions may also be affected.
osCommerce is prone to multiple input-validation vulnerabilities, including a directory-traversal issue and multiple cross-site scripting issues.
An attacker can exploit these issues to view sensitive information and to steal cookie-based authentication credentials. Other attacks are also possible.
Version 3.0a3 is vulnerable to this issue; other versions may also be affected.
Exploit / POC
OSCommerce Multiple Input Validation Vulnerabilities
An attacker can exploit the directory-traversal vulnerability through a web client and can exploit the cross-site scripting vulnerability by enticing an unsuspecting victim to follow a malicious URI.
An attacker can exploit the directory-traversal vulnerability through a web client and can exploit the cross-site scripting vulnerability by enticing an unsuspecting victim to follow a malicious URI.
Solution / Fix
OSCommerce Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].