QuadComm Q-Shop recommend.asp XSS

2004-01-26T06:58:16
ID OSVDB:3697
Type osvdb
Reporter OSVDB
Modified 2004-01-26T06:58:16

Description

Vulnerability Description

Quadcomm Q-Shop contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the recommend.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Quadcomm Q-Shop contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the recommend.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://quadcomm.com/qshop/ Secunia Advisory ID:10704 Other Advisory URL: http://archives.neohapsis.com/archives/bugtraq/2004-01/0227.html ISS X-Force ID: 14923 CVE-2004-2109 Bugtraq ID: 9480