Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12147
HistoryApr 10, 2006 - 12:00 a.m.

interaktiv.shop v.5 XSS vuln.

2006-04-1000:00:00
vulners.com
5

interaktiv.shop v.5 XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 10 april 2006
vendor:http://www.interaktiv.net/
affected versions:.V.5 and prior
orginal
advisory:http://pridels.blogspot.com/2006/04/interaktivshop-v5-xss-vuln.html
###############################################

Vuln. Description:

interaktiv.shop contains a flaws that allows a remote cross site scripting
attacks.
Those flaws exists because input passed to "pn" and "sbeg" parameter in
"shop_main.cgi" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/cgi-bin/interaktiv.shop/front/shop_main.cgi?func
=det&wkid=41587822301246215&rub1=Footprints&rub2=
Architect&artnr=114&pn=%22%3Cscript%3Ealert('r0t'
)%3C/script%3E

/cgi-bin/interaktiv.shop/front/shop_main.cgi?fun
c=searchdo&sfields=&wkid=41587822301246215&rub1_
search=all&sfield=1&sbeg=%22%3Cscript%3Ealert('r
0t')%3C/script%3E

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
Greetings to: der4444,xaPridel,cembo,g0df4th3r,
waraxe,FrozenEye,str0ke,RaZbh,rst team,nst team
###############################################
More information @ unsecured-systems.com/forum/