Login
Please enter your credentials to continue.
/-----------------------------------------------------------------\ | Microcart 1.0 _Admin Cross-Site Scripting Security Vulnerability | \-----------------------------------------------------------------/ Summary ======= Microcart 1.0 is subject to a cross-site scripting vulnerability. A generic parameter on the /_admin/index.php page was found to be subject to a cross-site scripting vulnerability. It was possible to inject arbitrary Javascript into the URL via the query string or following a ‘/’ character. This code is then passed into a form action parameter without sanitisation, and executed by the browser. Injecting the following Javascript code into a generic parameter on the /_admin/index.php page will trigger the vulnerability, causing the page to return a Javascript alert box. CVE number: CVE-2012-4241 Impact: Medium Vendor homepage: http://microcart.sourceforge.net/ Vendor notified: 23/07/2012 Vendor resonse: This package is no longer being maintained and has subsequently been removed from sourceforge.net Credit: Chris Cooper and Joseph Sheridan of ReactionIS (http://www.reactionis.co.uk/) This advisory is posted at: http://www.reactionpenetrationtesting.co.uk/microcart-_admin-xss.html Affected Products ======== ======== Microcart 1.0. Details ======= /_admin/index.php ----------------- A generic parameter on the /_admin/index.php page was found to be subject to a cross-site scripting vulnerability. It was possible to inject arbitrary Javascript into the URL via the query string or following a ‘/’ character. This code is then passed into a form action parameter without sanitisation, and executed by the browser. Injecting the following Javascript code into a generic parameter on the /_admin/index.php page will trigger the vulnerability, causing the page to return a Javascript alert box. "> Example Request: GET /microcart/_admin/index.php/"> HTTP/1.1 Host: 192.168.0.6 Referer: https://192.168.0.6/microcart/_admin/ Example Response: --- SNIP ---
Please enter your credentials to continue.