[NT] Multiple Vulnerabilities in Comersus BackOffice Lite
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 23 Jan 2005 14:31:33 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Multiple Vulnerabilities in Comersus BackOffice Lite
<http://www.comersus.com/index.html> Comersus ASP shopping cart is "a set
of ASP scripts creating an online shopping cart. It works on a database of
your own choosing, default is Microsoft Access, and includes online
Multiple security vulnerabilities have been discovered in the product
allowing an attacker: complete access over the product by accessing a
specific page, to inject arbitrary SQL statements into the program's
existing SQL statements and to cause cross site scripting vulnerabilities.
* Comersus BackOffice Lite version 6.0
* Comersus BackOffice Lite version 6.01
* Comersus BackOffice Lite version 6.02
Administrative Privileges Bypassing:
The /backofficelite/comersus_backoffice_install10.asp file is the last
step in the installation sequence of the ASP web Cart. One doesn't have to
be a shopping cart administrator to execute this file. Besides setting the
value of some variables, it also contains the following code:
registering the current session as having administrator rights on the
shopping cart software.
Therefore, by running this script one gives oneself full right to all the
scripts, including scripts to enter any SQL command, decrypt passwords,
Deleting the file after installation process has been completed.
SQL Injection in Referer String:
If the option pIndexVisitsCounter is set to -1 (this is not done by
default), the /store/default.asp script will add a line to the database:
mySQL="INSERT INTO visits (userIp, referrer, visitDate,
Interesting here is the pReferrer variable, which is loaded as follows:
pReferrer = request.ServerVariables("HTTP_Referer")
No further data validation is done on the MySQL string before it is send
to the database for processing. This allows the attacker to create his own
HTTP GET request and entering SQL code into the referer field, e.g.:
GET /comersus/store/default.asp HTTP/1.1
Referer: <SQLCODE HERE>
Disable visitor logging (pIndexVisitsCounter = 0).
Cross Site Scripting:
The following two files: comersus_supportError.asp and
comersus_backofficelite_supportError.asp are prone to a cross site