New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple reflecting XSS-, SQLi- and InformationDisclosure-vulnerabilities in Zeuscart v.4 #28
Comments
Hello Mr. Steffen Rösemann Thanks for posting the issue. Please send us more details to support@zeuscart.com , karthick@ajsquare.com We are committed to make the needful fixes and updates Thanks Karthick From: Steffen Rösemann [mailto:notifications@github.com] Dear developer team. I found multiple reflecting XSS-, SQLi- and InformationDisclosure-vulnerabilities in Zeuscart v.4 (current Github version). Please tell me, if you are interested in getting the information provided to patch the issues. If you are interested, please tell me an email-address where I can send my informations to or if I should post here directly. I am gonna releasing a security advisory on this issues (without technical details) on my blog. See http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html. If you are not responding until the 4th February 2015 (UTC+1), I will as well release the technical details of this issue and send it to the security mailing list FullDisclosure. Greetings from Germany. Steffen Rösemann — |
Done a minute ago! Thanks for reply! Greetings! |
Dear developer team. Its been 12 days since my initial report about these issues and I haven't got a reply from you since my email. Any news? Greetings. Steffen Rösemann |
HI, Updated the assembler Please check it and review. On your feedback. I'll update it in Master Thanks |
Hello. I will test the provided vulnerabilities with an updated version of the assembler file at the weekend and give you a feedback. Greetings. |
Hello. I just checked the vulnerabilities with the updated Assembler.php, which you provided above. The vulnerabilities are still there and can be abused by attackers. XSS attacks can be carried out by more than just using a script-tag (as provided in my examples) and can be quite complex. The information disclosure vulnerability is caused because the page seems to not check, if the user is logged in as an administrator and has the rights to see this site. You could use some code, that checks for a valid administrators session and redirects to index.php, if the user does not have a valid session. Greetings. Steffen Rösemann |
Hello Karthick. Its been 29 days since my initial request. Are you working on a patch? How should we go on to handle this issue? Please give me more information. Thank you! Greetings Steffen Rösemann |
After you refused to respond to my offers/questions, I decided to publish the details of the issues, which I provided you a month ago and gave the opportunity to figure out a solution for them together. To give responsible administrators the chance to decide using your ECommerce-CMS, I have sent the technical details as well to the security mailing list FullDisclosure. |
Dear developer team.
I found multiple reflecting XSS-, SQLi- and InformationDisclosure-vulnerabilities in Zeuscart v.4 (current Github version).
Please tell me, if you are interested in getting the information provided to patch the issues. If you are interested, please tell me an email-address where I can send my informations to or if I should post here directly.
I am gonna releasing a security advisory on this issues (without technical details) on my blog. See http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html. If you are not responding until the 4th February 2015 (UTC+1), I will as well release the technical details of this issue and send it to the security mailing list FullDisclosure.
Greetings from Germany.
Steffen Rösemann
The text was updated successfully, but these errors were encountered: