[HSC Security Group] XSS in CartWiz

zinho_at_hackerscenter.com
Date: 07/26/05

  • Next message: Sec-Tec Lists: "RE: ClamAV Multiple Rem0te Buffer Overflows"
    Date: 26 Jul 2005 15:29:41 -0000
    To: bugtraq@securityfocus.com
    
    
    ('binary' encoding is not supported, stored as-is) Hackers Center Security Group (http://www.hackerscenter.com/)
    Zinho's Security Advisory

    Desc: XSS in CartWIZ
    Risk: Medium (Cookie stealing)

    store/viewCart.asp?message=%3Cplaintext%3E

    allows anyone to retrieve cookie and take control over the account.
    I noticed there are also some unchecked input when a user log in into his account and change his own personal data.
    This could lead to a permanent xss hole much more dangerous than the above.


  • Next message: Sec-Tec Lists: "RE: ClamAV Multiple Rem0te Buffer Overflows"

    Relevant Pages