The remote host runs CactuShop, an e-commerce web application written in ASP. It is vulnerable to cross-site scripting and SQL injection due to lack of sanitization of user-supplied data
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CactuShop XSS and SQL injection flaws | 3 Nov 200500:00 | – | openvas |
![]() | CactuShop 5.x Multiple Remote Vulnerabilities (XSS, SQLi) | 12 Oct 200400:00 | – | nessus |
![]() | CVE-2004-1881 | 10 May 200504:00 | – | cve |
![]() | CVE-2004-1882 | 10 May 200504:00 | – | cve |
![]() | CVE-2004-1881 | 10 May 200504:00 | – | cvelist |
![]() | CVE-2004-1882 | 10 May 200504:00 | – | cvelist |
![]() | CVE-2004-1881 | 31 Dec 200405:00 | – | nvd |
![]() | CVE-2004-1882 | 31 Dec 200405:00 | – | nvd |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/10019 |
securityfocus | www.securityfocus.com/bid/10020 |
# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
# Ref: Nick Gudov <[email protected]>
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.15461");
script_version("2024-06-13T05:05:46+0000");
script_tag(name:"last_modification", value:"2024-06-13 05:05:46 +0000 (Thu, 13 Jun 2024)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_cve_id("CVE-2004-1881", "CVE-2004-1882");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10019");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10020");
script_xref(name:"OSVDB", value:"4785");
script_xref(name:"OSVDB", value:"4786");
script_xref(name:"OSVDB", value:"4787");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("CactuShop XSS and SQL injection flaws");
script_category(ACT_ATTACK);
script_tag(name:"qod_type", value:"remote_vul");
script_copyright("Copyright (C) 2004 David Maciejak");
script_family("Web application abuses");
script_require_ports("Services/www", 80);
script_dependencies("find_service.nasl", "httpver.nasl", "webmirror.nasl",
"DDI_Directory_Scanner.nasl", "cross_site_scripting.nasl",
"global_settings.nasl", "gb_microsoft_iis_http_detect.nasl");
script_exclude_keys("Settings/disable_cgi_scanning");
script_tag(name:"solution", value:"Upgrade to the latest version of this software.");
script_tag(name:"summary", value:"The remote host runs CactuShop, an e-commerce web application written in ASP.
The remote version of this software is vulnerable to cross-site scripting
due to a lack of sanitization of user-supplied data in the script
'popuplargeimage.asp'.
Successful exploitation of this issue may allow an attacker to execute
malicious script code on a vulnerable server.
This version may also be vulnerable to SQL injection attacks in
the scripts 'mailorder.asp' and 'payonline.asp'. The user-supplied
input parameter 'strItems' is not filtered before being used in
an SQL query. Thus the query modification through malformed input
is possible.
Successful exploitation of this vulnerability can enable an attacker
to execute commands in the system (via MS SQL the function xp_cmdshell).");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
port = http_get_port(default:80);
if ( ! http_can_host_asp(port:port) )
exit(0);
host = http_host_name( dont_add_port:TRUE );
if( http_get_has_generic_xss( port:port, host:host ) )
exit( 0 );
buf = http_get(item:"/popuplargeimage.asp?strImageTag=<script>foo</script> ", port:port);
r = http_keepalive_send_recv(port:port, data:buf);
if( ! r )
exit( 0 );
if(r =~ "^HTTP/1\.[01] 200" && egrep(pattern:"<script>foo</script>", string:r))
{
security_message(port);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo