mailing list archives
Re: Multiple XSS Vulnerabilities in Zen Cart 1.3.5
From: security () armorize com
Date: 14 Oct 2006 05:59:36 -0000
Armorize Technologies Security Advisory
Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a
PHP e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and
run online store.
Zen Cart 1.3.5
Zen Cart 1.3.2
Privacy leakages from the client-side may lead to session hijacking, identity theft and information theft.
POST variables admin_name and admin_pass are vulnerable.
POST variable admin_email is vulnerable.
1. Escape every questionable URI and HTML script.
2. Remove prohibited user input.
2006/09/27 Published partial advisory; Notified vendor
2006/09/29 Received request from Ian Wilson of Zen Cart for more details
2006/10/02 Zen Cart released official patch for this vulnerability
2006/10/04 Published full advisory
2006/10/14 Full disclosure at SecurityFocus mailing list
Credit: Security Team at Armorize Technologies, Inc. (security () armorize com)
Link to this Armorize advisory
Links to all Armorize advisories
Links to Armorize vulnerability database
Armorize Technologies is delivering the worlds most advanced source code analysis solution for Web application
security based on its award-winning and patent-pending verification technologies. Addressing security early in the
software development life cycle (SDLC), Armorize CodeSecure proactively identifies and traces vulnerabilities in Web
application source code, effectively hardening websites against todays ever growing security threats. CodeSecures
zero-false-positive accuracy, traceback support and Web 2.0-based interface make it the premium Web application
security solution. For more information please visit: http://www.armorize.com.
- Re: Multiple XSS Vulnerabilities in Zen Cart 1.3.5 security (Oct 14)