TUCoPS :: HP Unsorted W :: bx6151.htm

WebAsyst Shop-Script Multiple Input Validation Vulnerabilities
VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation Vulnerabilities
VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation Vulnerabilities



VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation 
Vulnerabilities

http://www.vupen.com/english/research-web.php 


I. BACKGROUND
---------------------

"WebAsyst Shop-Script FREE - simple and free PHP shopping cart script.
It provides basic shopping cart functionality and allows to create
a nice looking simple shopping cart add-on for your website.
Or to learn how shopping cart systems are designed."


II. DESCRIPTION
---------------------

VUPEN Web Vulnerability Research Team discovered 27 vulnerabilities
in WebAsyst Shop-Script FREE.

These issues are caused by input validation errors in various scripts
when processing user-supplied data and parameters, which could allow
local file inclusion, sql injection and cross site scripting attacks.


III. AFFECTED PRODUCTS
-------------------------------

WebAsyst Shop-Script FREE


IV. SOLUTION
-------------------

The vendor does not support the script any longer.

Remove WebAsyst Shop-Script FREE from your web site.


V. CREDIT
--------------

The vulnerability was discovered by Mohammed Boumediane of VUPEN Security


VI. ABOUT VUPEN Security
--------------------------------

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services/ 

* VUPEN Binary Analysis & Exploits Service :

http://www.vupen.com/exploits/ 


VII. REFERENCES
----------------------

http://www.vupen.com/english/advisories/2010/0882 


VIII. DISCLOSURE TIMELINE
----------------------------------- 

2010-04-13 - Vendor notified
2010-04-14 - Vendor response (script not supported any longer)
2010-04-14 - Public Disclosure




TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH