Multiple cross-site scripting (XSS) vulnerabilities in Zen Cart 1.3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_name or (2) admin_pass parameter in (a) admin/login.php, or the (3) admin_email parameter in (b) admin/password_forgotten.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/29248 | vdb entry |
http://www.zen-cart.com/forum/showthread.php?p=270823#post270823 | |
http://www.securityfocus.com/archive/1/447286/100/0/threaded | mailing list |
http://www.armorize.com/advisory.php?Keyword=Armorize-ADV-2006-0003 | |
http://www.securityfocus.com/bid/20242 | vdb entry exploit |
http://www.vupen.com/english/advisories/2006/3849 | vdb entry vendor advisory |
http://securityreason.com/securityalert/1667 | third party advisory |
http://secunia.com/advisories/22118 | third party advisory |
http://www.zen-cart.com/forum/showthread.php?t=47526 |