Lucene search

K
zdt7Safe1337DAY-ID-11917
HistoryApr 21, 2010 - 12:00 a.m.

User Invoices Persistent XSS Vulnerability in CactuShop

2010-04-2100:00:00
7Safe
0day.today
24

EPSS

0.001

Percentile

50.2%

Exploit for asp platform in category web applications

=======================================================
User Invoices Persistent XSS Vulnerability in CactuShop
=======================================================

User Invoices Persistent XSS Vulnerability in CactuShop
 
1. Advisory Information
 
Title: User Invoices Persistent XSS Vulnerability in CactuShop
Advisory Id: CORE-2010-0406
Advisory URL: http://www.coresecurity.com/content/cactushop-xss-persistent-vulnerability
Date published: 2010-04-20
Date of last update: 2010-04-20
Vendors contacted: Cactusoft International and Cactusoft Ltd.
Release mode: Coordinated release
 
2. Vulnerability Information
 
Class: Cross site scripting [CWE-79]
Impact: Code execution
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2010-1486
Bugtraq ID: 39587
 
3.Vulnerability Description
 
CactuShop is an ASP shopping cart designed to provide a powerful base for e-commerce web sites hosted on Microsoft Windows web servers. A Cross Site Scripting (XSS) vulnerability has been discovered in CactuShop. This vulnerability occurs in the file that processes the user invoices (_invoice.asp). A malicious user can abuse of this flaw by requesting for an invoice and thus tricking an admin user into issuing him an invoice.
 
4. Vulnerable packages
 
    * CactuShop v6.1.
    * Older versions are probably affected too, but they were not checked.
 
5. Non-vulnerable packages
 
    * CactuShop v6.155.
 
6. Vendor Information, Solutions and Workarounds
 
The change made to the file _invoice.asp was to use the WriteSafe function on lines 88 and 100:
 
    87  ...
    88  O_BillingAddress = WriteSafe(replace(O_BillingAddress, vbcrlf & vbcrlf, vbcrlf))
 
    99  ... 
    100  O_ShippingAddress = WriteSafe(replace(O_ShippingAddress, vbcrlf & vbcrlf, vbcrlf)) 
 
This function HTML encodes any code an attacker might try to insert into the addresses to be run. This patch was applied to CactuShop v6.155.
 
7. Credits
 
This vulnerability was discovered and researched by 7Safe.
 
8. Technical Description / Proof of Concept Code
 
A Cross Site Scripting vulnerability has been discovered in the file that processes the user invoices: _invoice.asp. This occurs when a user with a malicious billing address ("/><script>alert(1);</script>) requests for an invoice and could thus trick an admin user into issuing him an invoice.
9. Report Timeline
 
    * 2010-04-06: Core Security Technologies notifies the CactuShop team two vulnerabilities in their software, a XSS vulnerability and a SQL-Injection vulnerability. April 19th, 2010, is proposed as a release date.
    * 2010-04-07: The CactuShop team asks Core for a technical description of the vulnerabilities.
    * 2010-04-07: Technical details sent to CactuShop team by Core.
    * 2010-04-08: The CactuShop team confirms the XSS vulnerability but notifies they do not think the SQL-Injection belongs to CactuShop code; it looks like it may be a customer modification.
    * 2010-04-09: Core agrees the code with the SQL-Injection vulnerability will be probably a customer modification.
    * 2010-04-12: CactuShop team notifies they addresses the XSS problem and will make the patch available for registered users from CactuShop website. The release version of CactuShop will be v6.155.
    * 2010-04-19: Core notifies the advisory will be released tomorrow (2010-04-20).
    * 2010-04-20: The advisory CORE-2010-0406 is published. 



#  0day.today [2018-01-10]  #