###############################################
Vuln. discovered by : r0t
Date: 10 August 2007
vendor:http://www.storesprite.com/
affected versions:Storesprite 7 and previous
###############################################
Storesprite contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "next" parameter in "secure/addaddress.php","secure/editshipdetails.php","secure/register.php",
"secure/login.php" isn't properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
Subscribe to:
Post Comments (Atom)
1 comment:
A patch is available:
The following code should be pasted into all config files before the
closing ?> tag:
//---- start xss vun patch ---
$allow_next = array("selectdeliveryaddress.php","revieworder.php");
if ($_GET[next]) {
if (!in_array("$_GET[next]", $allow_next)) {
echo "Not allowed!";
exit;
}
}
//--- end xss vun patch --
Post a Comment