mailing list archives
CactuSoft CactuShop v5.x shopping cart software multiple security vulnerabilities
From: S-Quadra Security Research <research () s-quadra com>
Date: Wed, 31 Mar 2004 16:13:56 +0400
S-Quadra Advisory #2004-03-31
Topic: CactuSoft CactuShop v5.x shopping cart software multiple security
Vendor URL: http://www.cactushop.com
Advisory URL: http://www.s-quadra.com/advisories/Adv-20040331.txt
Release date: 31 Mar 2004
CactuShop is an ASP application for running an e-commerce web site. It
incorporates a databased catalogue system, front end pages for product
navigation, back end pages for updating product details and robust
basket code for memorizing product selections as a visitor moves around
the web site. ASP software is designed to run on a Microsoft NT or Win
2000 server and to use MS Access, MS SQL Server or MySQL as a backend.
Please visit http://www.cactushop.com for information about CactuShop
-- Vulnerability 1: SQL Injection vulnerability
An SQL Injection vulnerability has been found in following scripts :
'mailorder.asp' and 'payonline.asp'. User supplied input parameter is
'strItems' not filtered before being used in an SQL query. Thus the
query modification through malformed input is possible.
Successful exploitation of this vulnerability can enable an attacker
to execute commands in the system (via MS SQL xp_cmdshell function).
-- Vulnerability 2: Cross Site Scripting vulnerability found in
user to visit it a remote attacker can steal user session id and gain
access to user's personal data.
Platform: MS SQL Server as a backend
Posting this data to 'payonline.asp' executes 'dir c:' command
strAgain=yes&CD_EmailAddress=dummy () someemailservice com&CD_Password=&
-- Vulnerability 2:
3. FIX INFORMATION
11 Mar 2004: S-Quadra alerted CactuSoft (CactuShop developers) on these
15 Mar 2004: CactuSoft response:
"1) SQL Injection
On payonline.asp and all mailorder pages the strItems field is now
parsed for single-quote (') characters before being used with database
queries. Single quotes are escaped (replaced with 2 single-quotes) to
ensure SQL Injection won't work.
The strImageTag field is parse for HTML tags characters (< and >) and
are removed from the string. This should ensure against <script> and any
other HTML tags.
This can be tested on the demo of the new CactuShop v5.1
16 Mar 2004: S-Quadra tested patched version of CactuShop.
Vulnerabilities not fixed. New PoC Code:
For SQL Injection
16 Mar 2004: S-Quadra alerted CactuSoft about new PoC Code.
26 Mar 2004: S-Quadra alerted CactuSoft about new PoC Code.
From 03.16.2004 Cactusoft dropped their communication with us so no
further response has been received therefore no new Fix information is
Nick Gudov, chief security researcher at S-Quadra <cipher () s-quadra com>
has detected above mentioned vulnerabilities.
S-Quadra dedicates its substantial knowledge and resources to managing
clients' IT security risks. S-Quadra audits and protection for software
and networks implement pioneering methods and ground-breaking
S-Quadra Advisory #2004-03-31
Full-Disclosure - We believe in it.
- CactuSoft CactuShop v5.x shopping cart software multiple security vulnerabilities S-Quadra Security Research (Mar 31)