CubeCart 5.x Cross Site Scripting

2013-01-01T00:00:00
ID PACKETSTORM:119189
Type packetstorm
Reporter Aung Khant
Modified 2013-01-01T00:00:00

Description

                                        
                                            `1. OVERVIEW  
  
CubeCart 5.x versions are vulnerable to Cross Site Scripting.  
  
  
2. BACKGROUND  
  
CubeCart is an "out of the box" ecommerce shopping cart software  
solution which has been written to run on servers that have PHP &  
MySQL support. With CubeCart you can quickly setup a powerful online  
store which can be used to sell digital or tangible products to new  
and existing customers all over the world.  
  
  
3. VULNERABILITY DESCRIPTION  
  
Multiple parameters are not properly sanitized, which allows attacker  
to conduct Cross Site Scripting attack. This may allow an attacker to  
create a specially crafted URL that would execute arbitrary script  
code in a victim's browser.  
  
  
4. VERSIONS AFFECTED  
  
5.x  
  
  
5. Affected URLs and Parameters  
  
/admin.php (report[date][from] parameter]  
/admin.php (report[date][to] parameter)  
/index.php (review[email] parameter)  
/index.php (review[name] parameter)  
/index.php (review[title] parameter)  
/admin.php (report[date][from] parameter)  
  
  
6. SOLUTION  
  
The vendor has chosen not to fix the issue.  
  
  
7. VENDOR  
  
CubeCart Development Team  
http://cubecart.com/  
  
  
8. CREDIT  
  
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.  
  
  
9. DISCLOSURE TIME-LINE  
  
2012-12-22: Vulnerability disclosed  
2012-12-24: The vendor replied that the fix would not be implemented.  
2013-01-01: Vulnerability disclosed  
  
  
10. REFERENCES  
  
Original Advisory URL:  
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5x%5D_xss  
CubeCart Home Page: http://cubecart.com/  
  
#yehg [2013-01-01]  
---------------------------------  
Best regards,  
YGN Ethical Hacker Group  
Yangon, Myanmar  
http://yehg.net  
Our Lab | http://yehg.net/lab  
Our Directory | http://yehg.net/hwd  
`