Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Low Level XSS Security Exploit in Admin CP #389

Closed
abrookbanks opened this issue Mar 16, 2015 · 0 comments
Closed

Low Level XSS Security Exploit in Admin CP #389

abrookbanks opened this issue Mar 16, 2015 · 0 comments
Assignees
Labels
Milestone

Comments

@abrookbanks
Copy link
Member

The following low level security issue has been reported which could allow session data to be stolen in the unlikely event the browsers user agent is malformed with malicious code. This is considered to be a very low level threat and the chances of actual exploitation are expected to be slim to none.

Thanks goes to Ilca Lucian for the following report.

Description

This sub domain is vulnerable to an client side security issue named Cross-Site-Scripting , because the value of the untrusted input is render back to the user.
This can cause :
-authentication/cookie thief
-phishing
-malicious application installation in the shop.

The P.o.C / Exploit

Host: .mystore.com
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.4.0'">
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,
/
;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://
.mystore.comt/admin.php?_g=login
Cookie: d033f3275721410783e1a770ff9915a471426279907; PHPSESSID=6vbiogcqke43vi9aohmi7rd8q2; nav_Customers=true; PHPSESSID=6vbiogcqke43vi9aohmi7rd8q2
Connection: keep-alive

Cross Site Scripting [XSS] CubeCart v.6

In this demonstration I used a XSS vector that will echo the cookie in the main page in which the vector is executed thru the "search" parameter.
This client side security issue was tested in a controlled environment with the following configuration:
OS: Debian Wheezy
Browser: Mozilla Firefox & Google Chrome

Remediation

My remediation for this kind of problem is: to parameterize the untrusted input so it is not confused as its own javascript code and executes.

@abrookbanks abrookbanks added this to the 6.0.2 milestone Mar 16, 2015
@abrookbanks abrookbanks self-assigned this Mar 16, 2015
abrookbanks pushed a commit that referenced this issue Mar 16, 2015
@abrookbanks abrookbanks changed the title XSS Low Level Security Exploit in Admin CP Low Level XSS Security Exploit in Admin CP Mar 16, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant