what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

oscommerce-page-txt

oscommerce-page-txt
Posted Oct 4, 2006
Authored by Lostmon | Site lostmon.blogspot.com

osCommerce contains a flaw that allows a remote cross site scripting attack.This flaw exists because the application does not validate 'page' param upon submission to multiple scripts in /admin folder.This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

tags | exploit, remote, arbitrary, xss
SHA-256 | e784c526382627be9844d4f29fd4a4705c81c062f03f08b832c9eeae8976a0de

oscommerce-page-txt

Change Mirror Download
###############################################
osCommerce multiple Scripts 'page' param XSS
Vendor url: https://www.oscommerce.com
Vendor Bugtracker:https://www.oscommerce.com/community/bugs,4303
Advisore: https://lostmon.blogspot.com/2006/10/
oscommerce-multiple-scripts-page-param.html
Vendor notify:yes
###############################################


osCommerce contains a flaw that allows a remote cross site
scripting attack.This flaw exists because the application does
not validate 'page' param upon submission to multiple scripts
in /admin folder.This could allow a user to create a specially
crafted URL that would execute arbitrary code in a user's browser
within the trust relationship between the browser and the server,
leading to a loss of integrity.

The same situation is done in 'admin/geo_zones.php' but with
param 'zpage'.



####################
vERSIONS
####################

osCommerce 2.2 Milestone 2 Update 060817

####################
SOLUTION
####################

no solution was available at this time.


#######################
VULNERABLE CODE
#######################

Arround the line 30 in banner_manager.php we


tep_redirect(tep_href_link(FILENAME_BANNER_MANAGER,
'page=' . $HTTP_GET_VARS['page'] . '&bID=' .
$HTTP_GET_VARS['bID']));



the page param is called directly , not sanitize.
arround line 115 we have a similar situation ,
we GET page param without sanitice in any GET request.

In all of scripts vulnerables, we have the same situation,
but with diferent code

####################
scripts vulnerables
####################

admin/banner_manager.php
admin/banner_statistics.php
admin/countries.php
admin/currencies.php
admin/languages.php
admin/manufacturers.php
admin/newsletters.php
admin/orders_status.php
admin/products_attributes.php
admin/products_expected.php
admin/reviews.php
admin/specials.php
admin/stats_products_purchased.php
admin/stats_products_viewed.php
admin/tax_classes.php
admin/tax_rates.php
admin/zones.php

####################
Timeline
####################

Discovered: 27-09-2006
Vendor notify:03-10-2006
Vendor response:------
Vendor fix:--------
Disclosure: 03-10-2006 (vendor Bugtracker)
Public disclosure:04-10-2006

####################
EXAMPLES
####################

https://localhost/catalog/admin/banner_manager.php?page=1[XSS-code]
https://localhost/catalog/admin/banner_statistics.php?page=1[XSS-code]
https://localhost/catalog/admin/countries.php?page=1[XSS-code]
https://localhost/catalog/admin/currencies.php?page=1[XSS-code]
https://localhost/catalog/admin/languages.php?page=1[XSS-code]
https://localhost/catalog/admin/manufacturers.php?page=1[XSS-code]
https://localhost/catalog/admin/newsletters.php?page=1[XSS-code]
https://localhost/catalog/admin/orders_status.php?page=1[XSS-code]
https://localhost/catalog/admin/products_attributes.php?page=1[XSS-code]
https://localhost/catalog/admin/products_expected.php?page=1[XSS-code]
https://localhost/catalog/admin/reviews.php?page=1[XSS-code]
https://localhost/catalog/admin/specials.php?page=1[XSS-code]
https://localhost/catalog/admin/stats_products_purchased.php?page=1[XSS-code]
https://localhost/catalog/admin/stats_products_viewed.php?page=1[XSS-code]
https://localhost/catalog/admin/tax_classes.php?page=1[XSS-code]
https://localhost/catalog/admin/tax_rates.php?page=1[XSS-code]
https://localhost/catalog/admin/zones.php?page=1[XSS-code]

this is a simple evil url but we can do some moore elaborate url
in conjuncion with other archives not vulnerables... like this:

https://localhost/catalog/admin/categories.php?action=new_product_preview
&read=only&pID=12&origin=stats_products_viewed.php?page=2[XSS-code]

######################## €nd #####################

Thnx to Estrella to be my ligth.

--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: https://lostmon.blogspot.com/
--
La curiosidad es lo que hace mover la mente....
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close