what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Shop A La Cart SQL Injection/ Cross Site Scripting

Shop A La Cart SQL Injection/ Cross Site Scripting
Posted Sep 3, 2010
Authored by Ariko-Security

Shop A La Cart suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 20f0683102c4d88ea17cd1bac898cabcfb3e7c69f0dae33bf55a29bd8059f94d

Shop A La Cart SQL Injection/ Cross Site Scripting

Change Mirror Download
# Exploit Title: [Multiple vulnerabilities in SHOP A LA CART]
# Date: [03.09.2010]
# Author: [Ariko-Security]
# Software Link: [http://shopalacart.com]
# Version: [ALL]
# Tested on: [ALL]
# CVE : [n/a]

# Ariko-Security: Security Audits , Audyt bezpieczeństwa
# Advisory: 728/2010

============ { Ariko-Security - Advisory #1/9/2010 } =============

Multiple vulnerabilities in SHOP A LA CART

Vendor's Description of Software:
# http://shopalacart.com/shopping_cart_demo.php

Dork:
# N/A

Application Info:
# Name: SHOP A LA CART
# ALL versions

Vulnerability Info:
# Type: multiple SQL injections, multiple XSS, multiple iFrame
injections, multiple link injections,

Time Table:
# 20/08/2010 - Vendor notified.

Fix:
# n/a

Input passed via the "xGrp" parameter to catgrp.php is not properly
sanitised before being used in a SQL query.
Input passed via the "xCat" parameter to catmain.php and prodmain.php
is not properly
sanitised before being used in a SQL query.


Input passed to the "nLoginUser" ,"nCustPhone" parameters in
account_signup.php is not properly
sanitised before being returned to the user.

Input passed to the "nReferrer" ,"Zipcode" parameters in cart.php is not
properly
sanitised before being returned to the user.

Input passed to the "nPhone" ,"nMailName", "nFullName", "nEmail",
"nComments" parameters in popup_contact.php
is not properly sanitised before being returned to the user.

Input passed to the "nEmail" parameter in process_email.php
is not properly sanitised before being returned to the user.


Input passed to the "xRef" parameter in customer_login.php
is not properly sanitised before being returned to the user.


Input passed to the "xProd", "xCat" parameter in prodmain.php
is not properly sanitised before being returned to the user.

Input passed to the "nSearch" parameter in search.php
is not properly sanitised before being returned to the user.


Solution:
# Input validation of all vulnerable parameters should be corrected.

Vulnerability samples:
# http://[site]/cart.php?nReferrer=';</script><script>alert(XSS)</script>
# http://[site]/catgrp.php?xGrp=[SQLi]
# http://[site]/account_signup.php [POST]
nUpdate=1&nCustName=&nCustEmail=test%40altoromutual.com&nEmailOptOut=1&nCustPhone=%22%27%3E%3CA+HREF

%3D%22%2AAriko-Security.html%22%3EInjection%3C%2FA%3E&nLoginUser=&nLoginPass=&.x=0&.y=0

Credit:
# Discoverd By: Ariko-Security 2010
# Advisory:
http://advisories.ariko-security.com/september/audyt_bezpieczenstwa_729.html


--
Ariko-Secuirty

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close