Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12490
HistoryMay 01, 2006 - 12:00 a.m.

Avactis Shopping Cart vuln.

2006-05-0100:00:00
vulners.com
9

Avactis Shopping Cart vuln.

###############################################
Vuln. discovered by : r0t
Date: 1 may 2006
vendor:http://www.avactis.com
affected versions:0.1.2 and prior
orginal advisory:
http://pridels.blogspot.com/2006/05/avactis-shopping-cart-vuln.html
###############################################

Vuln. Description:

  1. sql inj.

Avactis Shopping Cart contains a flaw that allows a remote sql injection
attacks.Input passed to the "category_id" parameter in
"store_special_offers.php" and "store.php" isn't properly sanitised before
being used in a SQL query.
Input passed to the "prod_id" parameter in "cart.php" and "product_info.php"
isn't properly sanitised before being used in a SQL query.
This can be exploited to manipulate SQL queries by injecting arbitrary SQL
code.

examples:

/store_special_offers.php?asc_action=
SetCurrCat&category_id=1[SQL]

/cart.php?asc_action=AddToCart&prod_i
d=1[SQL]

/store.php?asc_action=SetCurrCat&cate
gory_id=[SQL]

/product_info.php?asc_action=SetCurren
tProduct&prod_id=[SQL]

  1. xss

Avactis Shopping Cart contains a flaw that allows a remote cross site
scripting attack. This flaw exists because input passed to "category_id"
parameter in "store.php","store_special_offers.php" and input passed to
"prod_id" parameter in "product_info.php" isn't properly sanitised before
being returned to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/store_special_offers.php?asc_action=
SetCurrCat&category_id=1[XSS]

/product_info.php?asc_action=SetCurren
tProduct&prod_id=[XSS]

/store.php?asc_action=SetCurrCat&categ
ory_id=[XSS]

  1. Full path disclure

Attacker doing sql injection tests will get full install path.

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/