WebAsyst Shop-Script Multiple Input Validation Vulnerabilities

2010.04.20
Risk: High
Local: No
Remote: Yes

VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation Vulnerabilities http://www.vupen.com/english/research-web.php I. BACKGROUND --------------------- "WebAsyst Shop-Script FREE - simple and free PHP shopping cart script. It provides basic shopping cart functionality and allows to create a nice looking simple shopping cart add-on for your website. Or to learn how shopping cart systems are designed." II. DESCRIPTION --------------------- VUPEN Web Vulnerability Research Team discovered 27 vulnerabilities in WebAsyst Shop-Script FREE. These issues are caused by input validation errors in various scripts when processing user-supplied data and parameters, which could allow local file inclusion, sql injection and cross site scripting attacks. III. AFFECTED PRODUCTS ------------------------------- WebAsyst Shop-Script FREE IV. SOLUTION ------------------- The vendor does not support the script any longer. Remove WebAsyst Shop-Script FREE from your web site. V. CREDIT -------------- The vulnerability was discovered by Mohammed Boumediane of VUPEN Security VI. ABOUT VUPEN Security -------------------------------- VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. Governmental and federal agencies, and global enterprises in the financial services, insurance, manufacturing and technology industries rely on VUPEN to improve their security, prioritize resources, cut time and costs, and stay ahead of the latest threats. * VUPEN Vulnerability Notification Service: http://www.vupen.com/english/services/ * VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/exploits/ VII. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/0882 VIII. DISCLOSURE TIMELINE ----------------------------------- 2010-04-13 - Vendor notified 2010-04-14 - Vendor response (script not supported any longer) 2010-04-14 - Public Disclosure

Referencje:

http://www.vupen.com/english/research-web.php
http://www.vupen.com/english/advisories/2010/0882
http://www.securityfocus.com/archive/1/archive/1/510741/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top