TUCoPS :: Web :: Specific Sites :: qcom.htm

QuickCommerce E-Commerce spoofable pages - could result in free goods

    QuickCommerce E-Commerce


    QuickCommerce E-Commerce


    Erik  Tayler  found  following.   A  vulnerability  exists  in the
    entire QuickCommerce E-Commerce solutions package. For every  item
    that you want your customer to buy, you are required to place  the
    following code on your page...

        <FORM METHOD=POST ACTION="https://secure.quickcommerce.net/gateway/transact.dll">

        <INPUT TYPE=HIDDEN NAME="x_Version" VALUE="3.0">

        <INPUT TYPE=HIDDEN NAME="x_Login" VALUE="???????">


        <INPUT TYPE=HIDDEN NAME="x_Amount" VALUE="3000.00">

        <INPUT TYPE=HIDDEN NAME="x_Cust_ID" VALUE="??????">

        <INPUT TYPE=HIDDEN NAME="x_Description" VALUE="EZ All for Bonds and S&P 500">

        <INPUT TYPE=HIDDEN NAME="x_Invoice_Num" VALUE="29910">

        <INPUT TYPE=SUBMIT FONT-SIZE="-2" VALUE="ONLY $3,000.00">


    Erik took  out the  values for  x_Login and  x_Cust_ID for obvious
    reasons.  One could take this  code from a page after viewing  the
    source,  and  place  it  on  a  blank  (or  not) page on their own
    server.  One could change the  value for x_Amount to 0.00 or  0.01
    and  get  free  products.  Of  course  if you view the source, you
    would  see  that  the  x_Login  and  x_Cust_ID  values are already
    there, so  no need  to go  hunting for  the person's  login id and


    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH