---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: OXID eShop Script Insertion and Session Fixation Vulnerabilities SECUNIA ADVISORY ID: SA39224 VERIFY ADVISORY: http://secunia.com/advisories/39224/ DESCRIPTION: Michael Mueller has reported some vulnerabilities in OXID eShop, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct session fixation attacks. 1) Input passed via the "recomm_title", "recomm_author", and "recomm_desc" parameters to account_recommlist.php is not properly sanitised before being displayed to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. 2) An error in the handling of sessions in the admin panel can be exploited to hijack a user's session by tricking the user into logging in after following a specially crafted link. The vulnerabilities are reported in OXID eShop Professional, Community, and Enterprise versions prior to 4.3.0. SOLUTION: Update to OXID eShop Professional, Community, or Enterprise version 4.3.0. PROVIDED AND/OR DISCOVERED BY: Michael Mueller, Integralis ORIGINAL ADVISORY: OXID eShop: http://wiki.oxidforge.org/Security_bulletins/2010-001 http://wiki.oxidforge.org/Security_bulletins/2010-002 Micheal Mueller: http://archives.neohapsis.com/archives/bugtraq/2010-03/0250.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------