CodeThatShoppingCart catalog.php id Variable XSS

2005-05-09T11:17:19
ID OSVDB:16155
Type osvdb
Reporter Lostmon Lords(Lostmon@gmail.com)
Modified 2005-05-09T11:17:19

Description

Vulnerability Description

CodeThatShoppingCart contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' variable upon submission to the catalog.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

CodeThatShoppingCart contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' variable upon submission to the catalog.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/codethat/catalog.php?action=category_show&id=2"><script>alert(document.cookie)</script>

References:

Vendor URL: http://www.codethat.com/shoppingcart/ Security Tracker: 1013924 Secunia Advisory ID:15251 Related OSVDB ID: 16157 Related OSVDB ID: 16156 Other Advisory URL: http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html CVE-2005-1593 Bugtraq ID: 13560