RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
BID:39570
Info
RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 39570 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 01 2010 12:00AM |
| Updated: | Apr 23 2010 09:33PM |
| Credit: | Valentin |
| Vulnerable: |
OnePound OnePound Shop 0 |
| Not Vulnerable: | |
Discussion
RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
OnePound Shop is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
This BID is being retired because the affected application is a service.
OnePound Shop is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
This BID is being retired because the affected application is a service.
Exploit / POC
RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/productinfo.php?id=[SQL injection]
http://www.example.com/productview.php?id=[SQL injection]
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/productinfo.php?id=[SQL injection]
http://www.example.com/productview.php?id=[SQL injection]
Solution / Fix
RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
RETIRED: OnePound Shop 'id' Parameter Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- OnePound Shop Homepage (OnePound)