Lucene search

K
exploitdbLaurent gaffieEDB-ID:28990
HistoryNov 13, 2006 - 12:00 a.m.

INFINICART - 'sendpassword.asp?email' Cross-Site Scripting

2006-11-1300:00:00
laurent gaffie
www.exploit-db.com
12

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/21043/info
 
Infinicart is prone to multiple input-validation vulnerabilities, including HTML-injection and SQL-injection issues, because the application fails to properly sanitize user-supplied input.
 
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
 
The vendor reports that these issues affect only the demonstration version of Infinicart and do not affect any official released versions of the application.
 
in /infinicart-demo/sendpassword.asp :
email= &lt;/textarea&gt;&#039;"><script>alert(document.cookie)</script>

AI Score

7.4

Confidence

Low

Related for EDB-ID:28990