NextAge Shopping Cart Software XSS

2006.04.27
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 5.8/10
Impact Subscore: 4.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: None

NextAge Shopping Cart Software XSS ------------------------------------------------------- Aria-security.com advisory Bug Discovered by R@1D3N (amin emami) AminRayden (at) yahoo (dot) com [email concealed] Date:25/04/2005 original advisory:http://www.aria-security.net/advisory/nextage/nextageshoppingca rt.txt -------------------------------------------------------- Affected software description: NextAge Shopping Cart Software Vendor:http://www.nextagecart.com Vulnerability: Fake form injection <Xss> --------------------------------------------------------- information About NextAge Shopping Cart Software: NextAge Cart Software can be used both as a ready out-of-the-box shopping cart solution and as a powerful shopping cart engine for a customized web shop. NextAge Cart is an extremely powerful shopping cart and web site builder application that allows you to customize, manage and effectively market your on-line store. --------------------------------------------------------- Disscution: A remote user can conduct cross-site scripting attacks.The 'panel' script does not properly validate user-supplied input at the username and password.So remote user can access to admin panel ---------------------------------------------------------- Exploit: example:http://www.nextagecart.com/demo/myadmin/index.php <form method="pst" action="http://[target]/[admin_Path]/index.php"> <input type="text" name="txtuserid" class="INPUT" size="30" value="xss injection code"> <br> <input type="password" name="txtpass" class="INPUT" size="30" value="xss injection code"> <br> <input <input type="submit" value="submit" class="button"> </form> -------------- Solution: N/A ------------- Greet:A.u.r.a - outlaw - majid - behzad


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top