Re: Multiple XSS Vulnerabilities in Zen Cart 1.3.5
- From: security@xxxxxxxxxxxx
- Date: 14 Oct 2006 05:59:36 -0000
Armorize Technologies Security Advisory
Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a PHP e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and run online store.
Zen Cart 1.3.5
Zen Cart 1.3.2
Privacy leakages from the client-side may lead to session hijacking, identity theft and information theft.
POST variables admin_name and admin_pass are vulnerable.
POST variable admin_email is vulnerable.
1. Escape every questionable URI and HTML script.
2. Remove prohibited user input.
2006/09/27 Published partial advisory; Notified vendor
2006/09/29 Received request from Ian Wilson of Zen Cart for more details
2006/10/02 Zen Cart released official patch for this vulnerability
2006/10/04 Published full advisory
2006/10/14 Full disclosure at SecurityFocus mailing list
Credit: Security Team at Armorize Technologies, Inc. (security@xxxxxxxxxxxx)
Link to this Armorize advisory
Links to all Armorize advisories
Links to Armorize vulnerability database
Armorize Technologies is delivering the world?s most advanced source code analysis solution for Web application security based on its award-winning and patent-pending verification technologies. Addressing security early in the software development life cycle (SDLC), Armorize CodeSecure? proactively identifies and traces vulnerabilities in Web application source code, effectively hardening websites against today?s ever growing security threats. CodeSecure??s zero-false-positive accuracy, traceback support and Web 2.0-based interface make it the premium Web application security solution. For more information please visit: http://www.armorize.com.