osCommerce 2.1/2.2 – ‘Checkout_Payment.php’ Error Output Cross-Site Scripting

osCommerce 2.1/2.2 – ‘Checkout_Payment.php’ Error Output Cross-Site Scripting

漏洞ID 1053771 漏洞类型
发布时间 2003-03-20 更新时间 2003-03-20
图片[1]-osCommerce 2.1/2.2 – ‘Checkout_Payment.php’ Error Output Cross-Site Scripting-安全小百科CVE编号 N/A
图片[2]-osCommerce 2.1/2.2 – ‘Checkout_Payment.php’ Error Output Cross-Site Scripting-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22393
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7155/info

Error output is not sufficiently sanitized of HTML and script code by osCommerce. This may allow for cross-site scripting attacks as remote users could create a malicious link to a site hosting osCommerce which contains hostile HTML and script code. When a such a link is visited, attacker-supplied code could be interpreted in the web client of the user.

http://www.example.com/checkout_payment.php?payment_error=cc&error=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E

Please note that the 'cc' value for 'payment_error' must be substituted with the name of a valid payment module.

相关推荐: Windows NT CVE-1999-0603 Remote Security Vulnerability

Windows NT CVE-1999-0603 Remote Security Vulnerability 漏洞ID 1208780 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 1999-01-01 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享