exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Cart66 Lite 1.5.4 Cross Site Scripting

WordPress Cart66 Lite 1.5.4 Cross Site Scripting
Posted Feb 9, 2015
Authored by Morten Nortoft, Kenneth Jepsen, Mikkel Vej

WordPress Cart66 Lite plugin version 1.5.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d55d456da2969e8282ba5b0b286d7eaf4ed8485ce8a79ef1261715e49dd305de

WordPress Cart66 Lite 1.5.4 Cross Site Scripting

Change Mirror Download
Title: WordPress 'Cart66 Lite :: WordPress Ecommerce' plugin - Reflected XSS
Version: 1.5.4
Author: Morten Nørtoft, Kenneth Jepsen, Mikkel Vej
Date: 2015/01/26
Download: https://wordpress.org/plugins/cart66-lite/
Contacted WordPress: 2015/01/26
================================================================


## Description:
================================================================
Cart66 is a simple to use yet powerful ecommerce plugin for WordPress. Sell digital products
and/or physical products with Cart66. The easiest to use WordPress ecommerce shopping cart plugin.


## Reflected XSS
================================================================
The plugin suffers from a reflected cross site scripting in the file orders.php
which is loaded in /wp4/wp-admin/admin.php?page=cart66_admin by viewing the orders.
The vulnerability can be exploited by tricking a logged in admin to click an URL


## PoC
================================================================
The vulnerable parameter is called "status". The "status" parameter is retrieved from a $_GET['status'] call
But is not further sanitized before printing the variable.

The vulnerability can be exploited using the following link:

/wp4/wp-admin/admin.php?page=cart66_admin&status=</script><script>alert(document.cookie);</script>

## Solution
================================================================
Update to version 1.5.5.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close