nopCommerce 3.70 Cross Site Scripting

Credit: Tal Argoni
Risk: Low
Local: No
Remote: Yes

Security Advisory CVE-ID: N/A Topic: Reflected Cross Site Scripting (XSS) Vulnerability in "successful registration" page Class: Input Validation Severity: Medium Discovery: 2016-04-28 Vendor Notification: 2016-04-28 Vendor response: 2016-05-30 Vendor Patch: 2016-05-31 Public Announced: 2016-08-15 Credits: Tal Argoni, CEH from Triad Security [] Affects: nopCommerce, open-source & free e-commerce solution 3.70 Resolved: Version 3.8 I. Background nopCommerce is open-source e-commerce shopping cart web application written in MVC.NET. After anonymous user successfully registered the application, the application return the user a successful registration page with "continue to the shop" button. The redirection's parameter (returnurl) value is supplied by the user and echo without output validation to the browser. II. Problem Description Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. The injected code is not stored within the application itself; it is only impacts users who open a maliciously crafted link or third-party web page. The attack string is included as part of the crafted URI or HTTP parameters, improperly processed by the application, and returned to the victim. Exploit code/POC: http://VulnopCommerce/registerresult/1?returnurl=%2fcustomer%2finfo'%3balert("hacked+by+triad+s ecurity")%3b%2f%2f III. Impact The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. IV. Workaround You can work around this problem by doing the following: 1. It is recommended to use HTML-encoded at any point where it is copied into application responses. V. Solution Download vendor patch from . Update to version 3.8 VI. References 77


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top