/-------------------------------------------------------------------\ | Microcart 1.0 Checkout Cross-Site Scripting Security Vulnerability | \-------------------------------------------------------------------/ Summary ======= Microcart 1.0 is subject to several cross-site scripting vulnerabilities. Multiple POST parameters on the /checkout.php page were found to be subject to a cross-site scripting vulnerability. It was possible to inject arbitrary Javascript into a POST request. This code is then passed into the page content without sanitisation, and executed by the browser. The following parameters are affected: first_name, last_name, cc, exp, cvv, address1, address2, city, state, zip, phone and email. Injecting the following Javascript code into any of the affected parameters on the /checkout.php page will trigger the vulnerability, causing the page to return a Javascript alert box. CVE number: CVE-2012-4241 Impact: Medium Vendor homepage: http://microcart.sourceforge.net/ Vendor notified: 23/07/2012 Vendor resonse: This package is no longer being maintained and has subsequently been removed from sourceforge.net Credit: Chris Cooper and Joseph Sheridan of ReactionIS (http://www.reactionis.co.uk/) This advisory is posted at: http://www.reactionpenetrationtesting.co.uk/microcart-checkout-xss.html Affected Products ======== ======== Microcart 1.0. Details ======= /checkout.php ------------- Multiple POST parameters on the /checkout.php page were found to be subject to a cross-site scripting vulnerability. It was possible to inject arbitrary Javascript into a POST request. This code is then passed into the page content without sanitisation, and executed by the browser. The following parameters are affected: first_name, last_name, cc, exp, cvv, address1, address2, city, state, zip, phone, email Injecting the following Javascript code into any of the affected parameters on the /checkout.php page will trigger the vulnerability, causing the page to return a Javascript alert box. Example Request: POST /microcart/checkout.php HTTP/1.1 Host: 192.168.0.6 Referer: https://192.168.0.6/microcart/checkout.php Cookie: PHPSESSID=2df3a1bb0sh1eka0nbte6u59e7 Content-Type: application/x-www-form-urlencoded Content-Length: 503 order_confirm=true&first_name=&last_name=&cc=&exp=&cvv=&address1=&address2=&city=&state=&zip=&phone=&email= Example Response: --- SNIP ---
Street Number: | Invalid entry. |
---|---|
Address: | Invalid entry. |
City: | Invalid entry. |
State: | Invalid entry. |
ZIP Code: | Invalid entry. |
Phone Number: | Invalid entry. |
Email Address: |