Dognædis Ref.: DGS-SEC-11
CVE Ref: CVE-2013-2282
Release Date: 2013/03/01
Discover Credits: CodeV - Code Analyzer
Bulletin Author(s): LLaranjeira - CodeV Team
Type: Cross Site Scripting
Level: High (Low/High/Critical)
CVSS: 3.2 (Av:N/AC:M/Au:S/C:C/I:P/A:N)
Vulnerable Application: Tomato Cart v22.214.171.124
TomatoCart is a next generation open source shopping cart, branched from osCommerce 3 as a separate project.
The referred vulnerabilities could be exploited through XSS (Cross-Site-Scripting) attacks.
Ultimately, the attacker could take complete control of the victims web-browser.
In a successful attack, the malicious script would be executed with the authenticated user permissions.
Generally, by exploiting this kind of vulnerability, it might be possible to achieve possible attack vectors to various kinds of attacks such as:
- Session/Cookie theft
- Account Hijacking
- Identity theft
- Accessing confidential resources
- Accessing pay content
- Account Denial of service
Aiming a correct resolution of the identified vulnerability, the data obtained through the $_GET['faqs_id'] input argument should be properly sanitized for HTML and following ECMAS usage.
At the moment, there is no official solution for the reported vulnerabilities.