lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050726152941.24688.qmail@securityfocus.com> Date: 26 Jul 2005 15:29:41 -0000 From: zinho@...kerscenter.com To: bugtraq@...urityfocus.com Subject: [HSC Security Group] XSS in CartWiz Hackers Center Security Group (http://www.hackerscenter.com/) Zinho's Security Advisory Desc: XSS in CartWIZ Risk: Medium (Cookie stealing) store/viewCart.asp?message=%3Cplaintext%3E allows anyone to retrieve cookie and take control over the account. I noticed there are also some unchecked input when a user log in into his account and change his own personal data. This could lead to a permanent xss hole much more dangerous than the above.