CartWIZ viewCart.asp message Variable XSS

2005-07-26T22:36:04
ID OSVDB:18463
Type osvdb
Reporter Zinho(zinho@hackerscenter.com)
Modified 2005-07-26T22:36:04

Description

Vulnerability Description

CartWIZ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'message' variable upon submission to the 'viewCart.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

CartWIZ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'message' variable upon submission to the 'viewCart.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/store/viewCart.asp?message=%3Cplaintext%3E

References:

Vendor URL: http://www.cartwiz.com/ Security Tracker: 1014581 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-07/0432.html ISS X-Force ID: 21554 CVE-2005-2427 CVE-2005-2386 Bugtraq ID: 14386