lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: 7 Jul 2003 19:59:05 -0000
From: Massimo Arrigoni <support@...lyimpact.com>
To: bugtraq@...urityfocus.com
Subject: Re: Another ProductCart SQL Injection Vulnerability


In-Reply-To: <20030705063915.10225.qmail@....securityfocus.com>

Additional information on how to better protect a ProductCart-powered 
store, and specifically on how to avoid unauthorized access to stores 
using a MS Access database, is available at this address:

http://www.earlyimpact.com/pdf/ProductCart_Security_Tips.pdf

In addition, security updates and other support information for 
ProductCart users is always available at the ProductCart Support Center, 
located at the following address:

http://www.earlyimpact.com/productcart/support/

If you have any questions, please contact Early Impact at 
support@...lyimpact.com

The Early Impact Team

>Received: (qmail 22231 invoked from network); 7 Jul 2003 19:30:29 -0000
>Received: from outgoing3.securityfocus.com (205.206.231.27)
>  by mail.securityfocus.com with SMTP; 7 Jul 2003 19:30:29 -0000
>Received: from lists.securityfocus.com (lists.securityfocus.com 
[205.206.231.19])
>	by outgoing3.securityfocus.com (Postfix) with QMQP
>	id 301F4A3236; Mon,  7 Jul 2003 13:14:55 -0600 (MDT)
>Mailing-List: contact bugtraq-help@...urityfocus.com; run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@...urityfocus.com>
>List-Help: <mailto:bugtraq-help@...urityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@...urityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@...urityfocus.com>
>Delivered-To: mailing list bugtraq@...urityfocus.com
>Delivered-To: moderator for bugtraq@...urityfocus.com
>Received: (qmail 25343 invoked from network); 5 Jul 2003 06:37:54 -0000
>Date: 5 Jul 2003 06:39:15 -0000
>Message-ID: <20030705063915.10225.qmail@....securityfocus.com>
>Content-Type: text/plain
>Content-Disposition: inline
>Content-Transfer-Encoding: binary
>MIME-Version: 1.0
>X-Mailer: MIME-tools 5.411 (Entity 5.404)
>From: Massimo Arrigoni <support@...lyimpact.com>
>To: bugtraq@...urityfocus.com
>Subject: Re: Another ProductCart SQL Injection Vulnerability
>
>In-Reply-To: <1057289439.3f04f4dfaf159@...mail.bosen.net>
>
>Instructions on how to address this security issue:
> 
>-------------------------------------------------------------------
> 
>User of ProductCart v1.5 and before:
>Please contact Early Impact ASAP to update to a later version of 
>ProductCart. Send a message to support@...lyimpact.com. The update is 
free.
> 
>-------------------------------------------------------------------
> 
>User of ProductCart v1.6:
>Open the file "pcadmin/login.asp" and replace the following lines:
> 
>pIdAdmin=replace(request.querystring("IdAdmin"),"'","''")
>pAdminPassword=enDeCrypt(request.querystring("adminPassword"), 
scCrypPass)
> 
>with
> 
>pIdAdmin=replace(request.querystring("IdAdmin"),"'","''")
>pIdAdmin=replace(pIdAdmin,"--","")
>If NOT isNumeric(pIdAdmin) then
>response.redirect "msg.asp?message=1"
>response.end
>end if pAdminPassword=enDeCrypt(request.querystring("adminPassword"), 
>scCrypPass)
> 
>-------------------------------------------------------------------
>
>Users of ProductCart v2:
>Replace "pcadmin/login.asp" with an updated version of this file that 
you 
>can request immediately by contacting Early Impact at 
>support@...lyimpact.com
> 
>-------------------------------------------------------------------
>
>We have already notified all ProductCart resellers of the above. We will 
>also notify within the next few hours all ProductCart users that have 
>purchased the software directly from us.
>
>At Early Impact we are working day and night to make our application as 
>secure as it can be. If you have any questions, please contact us at 
>support@...lyimpact.com
>
>Best Regards,
>
>The Early Impact Team
> 
>
>>Received: (qmail 20442 invoked from network); 4 Jul 2003 14:55:16 -0000
>>Received: from outgoing3.securityfocus.com (205.206.231.27)
>>  by mail.securityfocus.com with SMTP; 4 Jul 2003 14:55:16 -0000
>>Received: from lists.securityfocus.com (lists.securityfocus.com 
>[205.206.231.19])
>>	by outgoing3.securityfocus.com (Postfix) with QMQP
>>	id E4498A3228; Fri,  4 Jul 2003 08:56:07 -0600 (MDT)
>>Mailing-List: contact bugtraq-help@...urityfocus.com; run by ezmlm
>>Precedence: bulk
>>List-Id: <bugtraq.list-id.securityfocus.com>
>>List-Post: <mailto:bugtraq@...urityfocus.com>
>>List-Help: <mailto:bugtraq-help@...urityfocus.com>
>>List-Unsubscribe: <mailto:bugtraq-unsubscribe@...urityfocus.com>
>>List-Subscribe: <mailto:bugtraq-subscribe@...urityfocus.com>
>>Delivered-To: mailing list bugtraq@...urityfocus.com
>>Delivered-To: moderator for bugtraq@...urityfocus.com
>>Received: (qmail 13256 invoked from network); 4 Jul 2003 03:28:46 -0000
>>X-Qmail-Scanner-Mail-From: mobile@...en.net via prambanan.java.net.id
>>X-Qmail-Scanner: 1.16 (Clear:SA:0(0.0/5.0):. Processed in 0.586905 secs)
>>Message-ID: <1057289439.3f04f4dfaf159@...mail.bosen.net>
>>Date: Fri,  4 Jul 2003 10:30:39 +0700
>>From: Bosen <mobile@...en.net>
>>To: bugs@...uritytracker.com, bugtraq@...urityfocus.com
>>Subject: Another ProductCart SQL Injection Vulnerability
>>MIME-Version: 1.0
>>Content-Type: text/plain; charset=ISO-8859-1
>>Content-Transfer-Encoding: 8bit
>>X-Originating-IP: 202.73.121.173
>>X-Errot-Report-To: Agus Supriadhie <bosen@...ionline.org>
>>X-Version: 3.1
>>X-Spam-Status: No, hits=0.0 required=5.0
>>	tests=none
>>	version=2.55
>>X-Spam-Level: 
>>X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)
>>
>>ProductCart SQL Injection Vulnerability
>>________________________________________________________________________
__
>_____
>>
>>
>>1ndonesian Security Team (1st)
>>http://bosen.net/releases/
>>========================================================================
==
>=====
>>Security Advisory
>>
>>
>>
>>Advisory Name: ProductCart SQL Injection Vulnerability
>> Release Date: 06/20/2003
>>  Application: 
>>               ProductCart v1.5  
>>               ProductCart v1.5002                 
>>               ProductCart v1.5003                 
>>               ProductCart v1.5003r                 
>>               ProductCart v1.5004  
>>               ProductCart v1.6b  
>>               ProductCart v1.6br  
>>               ProductCart v1.6br001  
>>               ProductCart v1.6br003
>>               ProductCart v1.6b001
>>               ProductCart v1.6b002                              
>>               ProductCart v1.6b003               
>>               ProductCart v1.6002
>>               ProductCart v1.6003
>>               ProductCart v2
>>               ProductCart v2br000                                   
>>     Platform: Win32/MSSQL
>>     Severity: High
>>     BUG Type: SQL Injection
>>       Author: Bosen <mobile@...en.net>
>>  Discover by: Bosen <mobile@...en.net>
>>Vendor Status: See below.
>>   Vendor URL: http://www.earlyimpact.com/
>>    Reference: http://bosen.net/releases/
>>
>>
>>
>>Overview:
>>From the web
>>"ProductCart® is an ASP shopping cart that combines sophisticated 
>ecommerce 
>>features with time-saving store management tools and remarkable ease of 
>use."
>>From the author
>>"Even the application is not Open Source, but we can 'debug' the 
>application
>>on the fly. And with SQL Injection we can query some information about 
>the 
>>tables
>>and database, even the data it self. With more work will couse ability 
to 
>>access into 
>>the admin control panel site."
>>
>>
>>
>>Details:
>>The error msg of the application handled very good, but not that good. 
>Couse 
>>still have
>>XSS injection vulnerbility (read my previous advisories). Those error 
>handler 
>>would make
>>exploitation very difficult to do.
>>But, not all script handled by those error handler script. 
>>For example Custva.asp, its still vulnerable to SQL Injection. 
>>
>>But the worst is, on the admin control panel which is can be injected 
by 
>old 
>>famous 
>>SQL injection 'or 1=1--'. Which makes you able to get access into admin 
>>control panel
>>without needing any access.
>>
>>
>>
>>Exploits/POC:
>>file Custva.asp
>>http://<target>/productcart/pc/Custvb.asp?redirectUrl=&Email=%
27+having+1%
>3D1--
>>&_email=email
>>&password=asd&_password=required&Submit.x=33&Submit.y=5&Submit=Submit
>>
>>file login.asp
>>http://<target>/produccart/pdacmin/login.asp?idadmin='' or 1=1--
>>
>>
>>
>>Vendor Response:
>>Contacted. No response yet.
>>
>>
>>
>>Recommendation:
>>No recommendation for this.
>>
>>
>>
>>1ndonesian Security Team (1st) Advisory:
>>http://bosen.net/releases/
>>
>>
>>
>>About 1ndonesian Security Team:
>>1ndonesian Security Team, research and develop intelligent, advanced 
>>application
>>security assessment. Based in Indonesia, 1ndonesian Security Team 
offers 
>best 
>>of
>>breed security consulting services, specialising in application, host 
and 
>>network
>>security assessments.
>>
>>1st provides security information and patches for use by the entire 1st 
>>community.
>>
>>This information is provided freely to all interested parties and may 
be 
>>redistributed provided that it is not altered in any way, 1st is 
>appropriately 
>>credited and the document retains.
>>
>>
>>Greetz to:
>>AresU, TioEuy, sakitjiwa, muthafuka, alphacentury 
>>All 1ndonesian Security Team - #hackers@...tnet.org/centrin.net.id
>>
>>
>>
>>
>>
>>
>>
>>Bosen <mobile@...en.net>
>>======================
>>Original document can be fount at http://bosen.net/releases/?id=40
>>
>>
>>
>


Powered by blists - more mailing lists