Multiple cross-site scripting vulnerabilities in FishCart 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) trackingnum, (2) reqagree, or (3) m parameter to upstracking.php or (4) nlst parameter to display.php. NOTE: the vendor was not able to reproduce some of the reported vectors but believes that they have been addressed. The original researcher is known to be unreliable.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=111530799109755&w=2 | mailing list |
http://www.osvdb.org/16280 | vdb entry |
http://www.securityfocus.com/archive/1/457754/100/200/threaded | mailing list |
http://secunia.com/advisories/15232/ | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20384 | vdb entry |
http://www.osvdb.org/16281 | vdb entry |
http://www.fishcart.org/archives/200505/msg00028.html | mailing list |
http://www.digitalparadox.org/advisories/fishc.txt | exploit |
http://www.securityfocus.com/bid/13499 | vdb entry exploit |