Posts

Showing posts from December, 2012

CubeCart 5.x | Multiple Cross Site Scripting Vulnerabilities

1. OVERVIEW

CubeCart 5.x versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

5.x


5. Affected URLs and Parameters

/admin.php (report[date][from] parameter]
/admin.php (report[date][to] parameter)
/index.php (review[email] parameter)
/index.php (review[name] parameter)
/index.php (review[title] parameter)
/admin.php (report[date][from] parameter)


6. SOLUTION

The vendor has …

CubeCart 5.x | Cross Site Request Forgery (CSRF) Vulnerability

1. OVERVIEW

CubeCart 5.x versions are vulnerable to Cross Site Request Forgery (CSRF).


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.x versions contain a flaw that allows a remote Cross-site
Request Forgery (CSRF / XSRF) attack. The flaw exists because the
application does not require multiple steps or explicit confirmation
for sensitive transactions for majority of administrator functions
such as adding new user, assigning user to administrative privilege.
By using a crafted URL, an attacker may trick the victim into visiting
to his web page to take advantage of the trust relationship between
the authenticated victim and the application. Such an attack coul…

CubeCart 5.0.7 and lower versions | Insecure Backup File Handling

1. OVERVIEW

CubeCart 5.0.7 and lower versions are vulnerable to Insecure Backup
File Handling which leads to the disclosure of the application
configuration file.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.0.7 and lower versions contain a flaw that insecurely backs
up the configuration file, "global.inc.php", upon new installation or
upgrade process. The name of backup configuration file is set to the
year, month, day, hour, minute that the process is performed. The
non-randomized nature of this backup scheme allows an attacker to
retrieve the file through brute-force method.


4. VERSIONS AFFECTED

5.0.7 and lower versions


5. Affected Files

/setu…

Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

1. OVERVIEW

Open-Realty CMS 3.x versions are vulnerable to Persistent Cross Site
Scripting (XSS).


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

3.x


5. PROOF-OF-CONCEPT/EXPLOIT

/admin/ajax.php (parameter: title, full_desc, ta)

///////////////////////////////////////////////////////

POST /admin/ajax.php?action=ajax_update_listing_data HTTP/1.1
Host: localhost
Content-Length: 574
Origin: http://localhost
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSI…

Open-Realty CMS 3.x | Cross Site Request Forgery (CSRF) Vulnerability

1. OVERVIEW

Open-Realty CMS 3.x versions are vulnerable to Cross Site Request Forgery.


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Open-Realty 3.x versions contain a flaw that allows a remote
Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists
because the application does not require multiple steps or explicit
confirmation for sensitive transactions for majority of administrator
functions such as adding new user, assigning user to administrative
privilege. By using a crafted URL, an attacker may trick the victim
into visiting to his web page to take advantage of the trust
relationship between the authenticated victim and the application.
Such an attack could trick the victim into executing arbitrary
commands in the context of their session wit…

CubeCart 4.x/5.x | Setup Re-installation Privilege Escalation Vulnerability

1. OVERVIEW

CubeCart 4.x and 5.x versions are vulnerable to Setup Re-installation
Privilege Escalation.

2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.

3. VULNERABILITY DESCRIPTION

CubeCart 4.x and 5.x versions contain a flaw that does not remove
set-up installation directory or warn users of the existence of set-up
installation directory. This allows an attacker to re-install the
application, gain administrator access and do malicious things such as
uploading malicious shell script to compromise the application server.

4. VERSIONS AFFECTED

CubeCart 4.x and 5.x

5. Affected URL

N.A

6. SOLUTION/WORKAROUND

The vendor has chosen not to fix the issue.
Workaround is to remove setup directory after instal…

CubeCart 4.4.6 and lower | Local File Inclusion Vulnerability

1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Local File Inclusion.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and lower versions contain a flaw that may allow a
remote attacker to execute arbitrary commands or code. The issue is
due to the '/admin.php' script not properly sanitizing user input,
specifically directory traversal style attacks (e.g., ../../) supplied
to the 'loc' parameter. This may allow an attacker to include a file
from the targeted host that contains arbitrary commands or code that
will be executed by the vulnerable script. Such attacks are limited
due to the script only calling files already on the…

CubeCart 4.4.6 and lower | Multiple SQL Injection Vulnerabilities

1. OVERVIEW

The CubeCart 4.4.6 and lower versions are vulnerable to SQL Injection.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/admin.php (active parameter)
/admin.php (cat_id parameter)
/admin.php (orderCol parameter)
/admin.php (orderDir parameter)


6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the curre…

CubeCart 4.4.6 and lower | Multiple Cross Site Scripting Vulnerabilities

1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/admin.php (countiesPage parameter)
/admin.php (countriesPage parameter)
/admin.php (dStart parameter)
/admin.php (edit parameter)
/admin.php (email parameter)
/admin.php (FCKeditor parameter)
/admin.php (gc%5Bmax%5D parameter)
/admin.ph…

CubeCart 4.4.6 and lower | Cross Site Request Forgery (CSRF) Vulnerability

1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Cross Site Request
Forgery (CSRF).


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and and lower versions contain a flaw that allows a
remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
appl…

CubeCart 5.0.7 and lower | Open URL Redirection Vulnerability

1. OVERVIEW

CubeCart 5.0.7 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.0.7 and lower versions contain a flaw that allows a remote
cross site redirection attack. This flaw exists because the
application does not properly sanitise the "redir" parameter. This
allows an attacker to create a specially crafted URL, that if clicked,
would redirect a victim from the intended legitimate web site to an
arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

5.0.7 and lower


5. Affected URL and Parameter

/admin.php (redir parameter)
/admin.php?redir=//yehg.net/%3f (Redirect after login…

CubeCart 4.4.6 and lower | Open URL Redirection Vulnerability

1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and lower versions contain a flaw that allows a remote
cross site redirection attack. This flaw exists because the
application does not properly sanitise the parameters, "r" and
"redir". This allows an attacker to create a specially crafted URL,
that if clicked, would redirect a victim from the intended legitimate
web site to an arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/index.php (r parameter)
/index.php (redir parameter)

/index…

PHP Charset Encoder updated

Image
http://yehg.net/encoding/

- Added quick POC XSS payloads
















 - Added a function for quick transformation of string into String.fromCharCode ready.







- Added Offline support and download link to PCE




CubeCart 3.0.20 (3.0.x) and lower | Multiple SQL Injection Vulnerabilities

1. OVERVIEW

The CubeCart 3.0.20 and lower versions are vulnerable to SQL Injection.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. Affected URLs and Parameters

/admin/products/extraCats.php (add parameter)
/admin/products/index.php (cat_id parameter)
/admin/products/index.php (category parameter)
/admin/products/index.php (orderCol parameter)

CubeCart 3.0.20 (3.0.x) and lower | Arbitrary File Upload

1. OVERVIEW

CubeCart 3.0.20 and lower versions are vulnerable to Arbitrary File Upload.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 3.0.20 and lower versions contain a flaw related to the
/admin/filemanager/upload.php script's failure to properly validate
uploaded files. This may allow a remote attacker to upload arbitrary
files and execute arbitrary code via a request to the 'atm-regen'
parameter.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. PROOF-OF-CONCEPT/EXPLOIT

Set content type to image/jpeg and upload.
Uploaded files are stored at images/uploads.


///////////////////////////////////////////////////////////…

CubeCart 3.0.20 (3.0.x) and lower | Multiple Cross Site Scripting Vulnerabilities

1. OVERVIEW

CubeCart 3.0.20 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. Affected URLs and Parameters

/admin/adminusers/permissions.php (adminId parameter)
/admin/categories/index.php (cat_name parameter)
/admin/categories/languages.php (cat_master_id parameter)
/admin/customers/ (searchStr pa…