ID EDB-ID:26033 Type exploitdb Reporter Zinho Modified 2005-07-26T00:00:00
Description
CartWIZ 1.10/1.20 ViewCart.ASP Cross Site Scripting Vulnerability. CVE-2005-2386 . Webapps exploit for asp platform
source: http://www.securityfocus.com/bid/14386/info
CartWIZ is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
http://www.example.com/store/viewCart.asp?message=%3Cplaintext%3E
{"id": "EDB-ID:26033", "type": "exploitdb", "bulletinFamily": "exploit", "title": "CartWIZ 1.10/1.20 ViewCart.ASP Cross-Site Scripting Vulnerability", "description": "CartWIZ 1.10/1.20 ViewCart.ASP Cross Site Scripting Vulnerability. CVE-2005-2386 . Webapps exploit for asp platform", "published": "2005-07-26T00:00:00", "modified": "2005-07-26T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/26033/", "reporter": "Zinho", "references": [], "cvelist": ["CVE-2005-2386"], "lastseen": "2016-02-03T02:41:59", "viewCount": 10, "enchantments": {"score": {"value": 4.5, "vector": "NONE", "modified": "2016-02-03T02:41:59", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-2386"]}, {"type": "osvdb", "idList": ["OSVDB:18463"]}], "modified": "2016-02-03T02:41:59", "rev": 2}, "vulnersScore": 4.5}, "sourceHref": "https://www.exploit-db.com/download/26033/", "sourceData": "source: http://www.securityfocus.com/bid/14386/info\r\n\r\nCartWIZ is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. \r\n\r\nhttp://www.example.com/store/viewCart.asp?message=%3Cplaintext%3E ", "osvdbidlist": ["18463"], "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:24:37", "description": "Cross-site scripting (XSS) vulnerability in viewCart.asp in CartWIZ 1.20 allows remote attackers to inject arbitrary web script or HTML via the message parameter.", "edition": 4, "cvss3": {}, "published": "2005-07-27T04:00:00", "title": "CVE-2005-2386", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-2386"], "modified": "2008-09-05T20:51:00", "cpe": ["cpe:/a:elemental_software:cartwiz:1.20", "cpe:/a:elemental_software:cartwiz:1.10"], "id": "CVE-2005-2386", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2386", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:elemental_software:cartwiz:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:elemental_software:cartwiz:1.20:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:14", "bulletinFamily": "software", "cvelist": ["CVE-2005-2427", "CVE-2005-2386"], "edition": 1, "description": "## Vulnerability Description\nCartWIZ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'message' variable upon submission to the 'viewCart.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nCartWIZ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'message' variable upon submission to the 'viewCart.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]/store/viewCart.asp?message=%3Cplaintext%3E\n## References:\nVendor URL: http://www.cartwiz.com/\nSecurity Tracker: 1014581\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-07/0432.html\nISS X-Force ID: 21554\n[CVE-2005-2427](https://vulners.com/cve/CVE-2005-2427)\n[CVE-2005-2386](https://vulners.com/cve/CVE-2005-2386)\nBugtraq ID: 14386\n", "modified": "2005-07-26T22:36:04", "published": "2005-07-26T22:36:04", "href": "https://vulners.com/osvdb/OSVDB:18463", "id": "OSVDB:18463", "type": "osvdb", "title": "CartWIZ viewCart.asp message Variable XSS", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}]}