what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenCart 2.1.0.1 Cross Site Scripting

OpenCart 2.1.0.1 Cross Site Scripting
Posted Jan 7, 2016
Authored by Onur YILMAZ, Ziyahan Albeniz | Site netsparker.com

OpenCart version 2.1.0.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4671
SHA-256 | be4592c9395d860112b8f4b1375f72eb230a7b5984f3c00b9ce788a9bce7ccc6

OpenCart 2.1.0.1 Cross Site Scripting

Change Mirror Download
Information
--------------------
Advisory by Netsparker
Name: XSS Vulnerability in OpenCart
Affected Software : OpenCart
Affected Versions: v2.1.0.1 and possibly below
Vendor Homepage : http://www.opencart.com
Vulnerability Type : Cross-site Scripting
Severity : Important
Status : Fixed
CVE-ID : CVE-2015-4671
Netsparker Advisory Reference : NS-15-023

Description
--------------------
By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in user’s session. This means that the malicious hacker can change
the logged in user’s password and invalidate the session of the victim
while the hacker maintains access. As seen from the XSS example in this
article, if a web application is vulnerable to cross-site scripting and the
administrator’s session is hijacked, the malicious hacker exploiting the
vulnerability will have full admin privileges on that web application.

Technical Details
--------------------
Proof of Concept URLs for XSS in OpenCart v2.1.0.1:

/opencart/index.php?route=account/address/add
(zone_id - POST)

For more information on cross-site scripting vulnerabilities read the
following article on Cross-site Scripting (XSS) -
https://www.netsparker.com/web-vulnerability-scanner/vulnerability-security-checks-index/crosssite-scripting-xss/

Advisory Timeline
--------------------
07/12/2015 - First Contact
16/12/2015 - Vendor Fixed
18/12/2015 - Advisory Released

Solution
--------------------
https://github.com/opencart/opencart/commit/303fa88fe664ded4bf8753b997abd916f0a3c03f


Credits & Authors
--------------------
These issues have been discovered by Ziyahan Albeniz while testing
Netsparker Web Application Security Scanner -
https://www.netsparker.com/web-vulnerability-scanner/

About Netsparker
--------------------
Netsparker web application security scanners find and report security flaws
and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in
all websites and web applications, regardless of the platform and
technology they are built on. Netsparker scanning engine’s unique detection
and exploitation techniques allow it to be dead accurate in reporting
vulnerabilities. The Netsparker web application security scanner is
available in two editions; Netsparker Desktop and Netsparker Cloud. Visit
our website https://www.netsparker.com for more information.

Onur Yılmaz - National General Manager

Netsparker Web Application Security Scanner <https://www.netsparker.com>
T: +90 (0)554 873 0482
Login or Register to add favorites

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close