Mini Web Shop Multiple Cross Site Scripting Vulnerabilities
BID:23847
Info
Mini Web Shop Multiple Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 23847 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-2532 |
| Remote: | Yes |
| Local: | No |
| Published: | May 02 2007 12:00AM |
| Updated: | May 07 2015 05:39PM |
| Credit: | CorryL is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
ObieWebsite Mini Web Shop 2 |
| Not Vulnerable: | |
Discussion
Mini Web Shop Multiple Cross Site Scripting Vulnerabilities
Mini Web Shop is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
An attacker can exploit these issues to steal cookie-based authentication credentials and launch other attacks.
This issue affects Mini Web Shop 2; other versions may also be affected.
Mini Web Shop is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
An attacker can exploit these issues to steal cookie-based authentication credentials and launch other attacks.
This issue affects Mini Web Shop 2; other versions may also be affected.
Exploit / POC
Mini Web Shop Multiple Cross Site Scripting Vulnerabilities
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proofs of concept are available:
http://remote-server/path/modules/sendmail.php/[xss]
http://remote-server/path/modules/order_form.php/[xss]
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proofs of concept are available:
http://remote-server/path/modules/sendmail.php/[xss]
http://remote-server/path/modules/order_form.php/[xss]
Solution / Fix
Mini Web Shop Multiple Cross Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].