|
Vulnerability QuickCommerce E-Commerce Affected QuickCommerce E-Commerce Description Erik Tayler found following. A vulnerability exists in the entire QuickCommerce E-Commerce solutions package. For every item that you want your customer to buy, you are required to place the following code on your page... <FORM METHOD=POST ACTION="https://secure.quickcommerce.net/gateway/transact.dll"> <INPUT TYPE=HIDDEN NAME="x_Version" VALUE="3.0"> <INPUT TYPE=HIDDEN NAME="x_Login" VALUE="???????"> <INPUT TYPE=HIDDEN NAME="x_Show_Form" VALUE="PAYMENT_FORM"> <INPUT TYPE=HIDDEN NAME="x_Amount" VALUE="3000.00"> <INPUT TYPE=HIDDEN NAME="x_Cust_ID" VALUE="??????"> <INPUT TYPE=HIDDEN NAME="x_Description" VALUE="EZ All for Bonds and S&P 500"> <INPUT TYPE=HIDDEN NAME="x_Invoice_Num" VALUE="29910"> <INPUT TYPE=SUBMIT FONT-SIZE="-2" VALUE="ONLY $3,000.00"> </FORM> Erik took out the values for x_Login and x_Cust_ID for obvious reasons. One could take this code from a page after viewing the source, and place it on a blank (or not) page on their own server. One could change the value for x_Amount to 0.00 or 0.01 and get free products. Of course if you view the source, you would see that the x_Login and x_Cust_ID values are already there, so no need to go hunting for the person's login id and such. Solution Nothing yet.