Document Title: =============== Interspire Shopping Cart v6 - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=593 Release Date: ============= 2012-06-02 Vulnerability Laboratory ID (VL-ID): ==================================== 593 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== Interspire Shopping Cart is the most feature rich, all-in-one shopping cart software available. It has an enterprise-grade feature set and is trusted by more than 15,000 businesses in over 65 countries. Feature Highlights Completely browser based Drag & drop layout editor Fully SEO optimized by experts Mobile commerce Min/max order quantity Easy-to-use store control panel Multiple logins with permissions Refunds & store credits Tabs on product pages Sell your products on eBay Amazingly flexible tax system Per-product inventory control 90+ designs included Easily customize your design Agree to terms to checkout Shipping zones & options Sell in multiple currencies Gift wrapping & messages Version 6 includes the ability sell on eBay as well as mobile commerce, Mailchimp integration, shopping comparison export, pre-orders, min/max order quantity and more. (Copy of the Vendor Homepage: http://www.interspire.com/shoppingcart ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple persistent Web vulnerabilities in Interspire Shopping Cart v6 CMS. Vulnerability Disclosure Timeline: ================================== 2012-06-03: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ Multiple persistent input validation vulnerabilities are detected in Interspire Shopping Cart v6 Content Management System. The bugs allow remote attackers to implement/inject malicious script code on the application-side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action & privileged user account of the application. The persistent vulnerabilities are located in the coupon name, product name & the bound export function but also in the password input profile listing. Vulnerable Module(s): [+] Marketing > Coupon > Create a Coupon Code > Name [+] Products > Name > STRING > View All > Mark Export these Products > x [+] Customer > Add or Register Customer > Password & Name Proof of Concept (PoC): ======================= The persistent web vulnerabilities can be exploited by remote attackers with privileged user account and low required user inter action. For demonstration or reproduce ... Products > Name > STRING > View All > Mark Export these Products > x
URL: http://shoppingcart.127.0.0.1:8080/inspire/shop/admin/index.php?ToDo=createCoupon2 Customer > Add or Register Customer > Password & Name