vendor:
XT:Commerce
by:
Philipp Niedziela
7,5
CVSS
HIGH
XSS
79
CWE
Product Name: XT:Commerce
Affected Version From: XT:Commerce < 3.04 SP2.1
Affected Version To: XT:Commerce < 3.04 SP2.1
Patch Exists: NO
Related CWE: N/A
CPE: a:xt-commerce:xt:commerce
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 10.04 / Apache
2010
Cross-Site-Scripting XT:Commerce < 3.04 SP2.1
XT:Commerce is prone to a (permanent) XSS. An attacker needs to create an account, inject javascript into field 'street' (e.g. '><script>alert(document.cookie)</script>) and place an order. When the administrator opens the order in the backend of the shop, the javascript will be executed. By getting the cookie of the admin, the attacker gets the session-id and user-id. If binding session and ip is not enabled, the attacker will be able to take over the admin-session.
Mitigation:
Enable binding session to IP in the backend of your shop.