Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:5891
HistoryMar 12, 2004 - 12:00 a.m.

[Full-Disclosure] Dogpatch Software CFWebstore 5.0 shopping cart software multiple security vulnerabilities

2004-03-1200:00:00
vulners.com
11
    S-Quadra Advisory #2004-03-12

Topic: Dogpatch Software CFWebstore 5.0 shopping cart software multiple
security vulnerabilities
Severity: High
Vendor URL: http://www.cfwebstore.com
Advisory URL: http://www.s-quadra.com/advisories/Adv-20040312.txt
Release date: 12 Mar 2004

  1. DESCRIPTION

"CFWebstoreยฎ is a completely integrated shopping cart and ecommerce
solution
written in Cold Fusion. Customize the templates or utilize the built-in
store
settings to create your own custom store. CFWebstore can handle just about
anything you want to accomplish in putting your business on the web!" -
www.cfwebstore.com site says. Please visit www.cfwebstore.com site for more
information about this software.

  1. DETAILS

โ€“ Vulnerability 1: SQL Injection vulnerability

An SQL Injection vulnerability has been found in the index.cfm script.
User
supplied input parameters named 'category_id', 'product_id' and
'feature_id' is
not filtered before being used in a SQL query. Consequently, query
modification
using malformed input is possible.

Successful exploitation of this vulnerability can enable an attacker to
execute
commands in the system (via MS SQL xp_cmdshell function).

โ€“ Vulnerability 2: Cross Site Scripting vulnerability in 'index.cfm'

By injecting specially crafted javascript code in URL and tricking a
user to visit
it a remote attacker can steal user session id and gain access to user's
personal data.

  1. FIX INFORMATION

S-Quadra alerted CFWebstore development team on these issues on 04 Mar
2004.
Dogpatch Software response:
"The 5.0.1 version of CFWebstore has been released which addresses all the
security issues previously mentioned. We recoded the validation we were
using to
a more standard method and added additional validations for some areas
that had
not been mentioned, due to our use of the Fusebox methodology, which
allows a
user with knowledge of the application to tap into areas other than through
typical URL variables."

  1. CREDITS

Nick Gudov, chief security researcher at S-Quadra <[email protected]> has
detected above mentioned vulnerabilities.

  1. ABOUT

S-Quadra dedicates its substantial knowledge and resources to managing
clients' IT security risks. S-Quadra audits and protection for software
and networks implement pioneering methods and ground-breaking
technologies.

    S-Quadra Advisory #2004-03-12

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html