what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

oscommerce.txt

oscommerce.txt
Posted Dec 23, 2003
Authored by James Bercegay | Site gulftech.org

osCommerce versions 2.2-MS1 and 2.2-MS2 allow a remote attacker to send a malformed URI that can effectively deny a user legitimate access to their account via a denial of service attack that will cause an unremovable item to be placed in the users shopping cart. These releases are also subject to SQL injection attacks and cross-site scripting problems as well.

tags | advisory, remote, denial of service, xss, sql injection
SHA-256 | 4c4f31e91ddc721a290c33f3497928cb959707eed54691809a10b531978ae64e

oscommerce.txt

Change Mirror Download
Vendor  : osCommerce
URL : http://www.oscommerce.com
Version : osCommerce 2.2-MS1 / osCommerce 2.2-MS2
Risk : SQL Injection Vulnerability & XSS in MS1
And Denial Of Service to users in MS1 & MS2



Description:
osCommerce is an online shop e-commerce solution under on going
development by the open source community. Its feature packed
out-of-the-box installation allows store owners to setup, run, and
maintain their online stores with minimum effort and with absolutely
no costs or license fees involved. It is used by millions of people
all around the world, and has been implemented into other web apps
such as oscMall and OSC-Nuke.



SQL Injection && Denial Of Service Vulnerability:
osCommerce 2.2 MS1 is vulnerable to SQL Injection vulnerability that can
allow an attacker to (or have an unsuspecting user) influence SQL Queries and/or
deny a legitimate user service. By sending a user a malformed URI an attacker
can effectively deny a user legitimate access to their account. Below is an
example URI and an explanation of the URI parameters.

/default.php?cPath=[MID]&sort=5a&page=1&action=buy_now&products_id=[PID][JNK]

[MID] = A Valid Manufacturer ID Number
[PID] = A Valid Product ID Number
[JNK] = SQL query or junk. %22 %5C %27 or %00 Will cause a DoS

The Denial of service will cause an unremovable item to be placed in the
users shopping cart. The next time that user logs out and logs back in they
will be greeted with the following SQL error message. If a user is not logged
in they will have an unremovable item until their session is terminated. If
a user is not logged in, is sent the malicious URI, and then logs in they
will have an unremovable item in their cart until the database is manually
altered by an admin. If it is a 2.2 MS1 installation the query will execute.

--[ Begin Error ]---------------------------------------------------------

1064 - You have an error in your SQL syntax. Check the manual that corresponds
to your MySQL server version for the right syntax to use near '[Problem_Here]'
and pd.products_id = p.products_id and pd.langu

select p.products_id, pd.products_name, p.products_model, p.products_price,
p.products_weight, p.products_tax_class_id from products p, products_description
pd where p.products_id='79'[Problem_Here]' and pd.products_id = p.products_id
and pd.language_id = '1'

--------------------------------------------------------------------------

I have found NO WAY to have a normally functioning account after this attack
is executed. Even if you are able to return to your shopping cart page you still
cannot purchase items or view your shopping cart. Furthermore, an attacker can
obviously use this flaw to possibly compromise the database, or even worse,
have some unsuspecting customer run SQL queries for them. While this attack does
not cause the SQL queries to be executed in osCommerce 2.2 MS2, it does allow
for an attacker to execute a Denial Of Service attack on a user by placing an
unremovable item in their shopping cart. Any webmasters experiencing this kind
of attack can delete the malicious values from the "customers_basket" table, but
be aware that will not stop any arbitrary SQL queries from being executed. Queries
are not executed in osCommerce 2.2 MS2 because the addslashes() function is being
used. However, someone out there may be able to figure something out ;)



Cross Site Scripting:
Cross site scripting is present in osCommerce 2.2 MS1 An attacker can exploit
this flaw by passing an invalid request to the Manufacturers ID parameter. An
example of this can be seen below

/default.php?manufacturers_id="><iframe src=http://www.gulftech.org>



Solution:
Vendor was contacted an plans on releasing a fix this week. Please see their
website at http://www.oscommerce.com for any details about the fix.



Credits:
Credits go to JeiAr of the GulfTech Security Research Team.
http://www.gulftech.org
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close