what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Shop A La Cart SQL Injection/ Cross Site Scripting

Shop A La Cart SQL Injection/ Cross Site Scripting
Posted Sep 3, 2010
Authored by Ariko-Security

Shop A La Cart suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 20f0683102c4d88ea17cd1bac898cabcfb3e7c69f0dae33bf55a29bd8059f94d

Shop A La Cart SQL Injection/ Cross Site Scripting

Change Mirror Download
# Exploit Title: [Multiple vulnerabilities in SHOP A LA CART]
# Date: [03.09.2010]
# Author: [Ariko-Security]
# Software Link: [https://shopalacart.com]
# Version: [ALL]
# Tested on: [ALL]
# CVE : [n/a]

# Ariko-Security: Security Audits , Audyt bezpieczeństwa
# Advisory: 728/2010

============ { Ariko-Security - Advisory #1/9/2010 } =============

Multiple vulnerabilities in SHOP A LA CART

Vendor's Description of Software:
# https://shopalacart.com/shopping_cart_demo.php

Dork:
# N/A

Application Info:
# Name: SHOP A LA CART
# ALL versions

Vulnerability Info:
# Type: multiple SQL injections, multiple XSS, multiple iFrame
injections, multiple link injections,

Time Table:
# 20/08/2010 - Vendor notified.

Fix:
# n/a

Input passed via the "xGrp" parameter to catgrp.php is not properly
sanitised before being used in a SQL query.
Input passed via the "xCat" parameter to catmain.php and prodmain.php
is not properly
sanitised before being used in a SQL query.


Input passed to the "nLoginUser" ,"nCustPhone" parameters in
account_signup.php is not properly
sanitised before being returned to the user.

Input passed to the "nReferrer" ,"Zipcode" parameters in cart.php is not
properly
sanitised before being returned to the user.

Input passed to the "nPhone" ,"nMailName", "nFullName", "nEmail",
"nComments" parameters in popup_contact.php
is not properly sanitised before being returned to the user.

Input passed to the "nEmail" parameter in process_email.php
is not properly sanitised before being returned to the user.


Input passed to the "xRef" parameter in customer_login.php
is not properly sanitised before being returned to the user.


Input passed to the "xProd", "xCat" parameter in prodmain.php
is not properly sanitised before being returned to the user.

Input passed to the "nSearch" parameter in search.php
is not properly sanitised before being returned to the user.


Solution:
# Input validation of all vulnerable parameters should be corrected.

Vulnerability samples:
# https://[site]/cart.php?nReferrer=';</script><script>alert(XSS)</script>
# https://[site]/catgrp.php?xGrp=[SQLi]
# https://[site]/account_signup.php [POST]
nUpdate=1&nCustName=&nCustEmail=test%40altoromutual.com&nEmailOptOut=1&nCustPhone=%22%27%3E%3CA+HREF

%3D%22%2AAriko-Security.html%22%3EInjection%3C%2FA%3E&nLoginUser=&nLoginPass=&.x=0&.y=0

Credit:
# Discoverd By: Ariko-Security 2010
# Advisory:
https://advisories.ariko-security.com/september/audyt_bezpieczenstwa_729.html


--
Ariko-Secuirty

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close