Multiple cross-site scripting (XSS) vulnerabilities in VaM Shop 1.6, 1.6.1, and probably earlier versions llow remote attackers to inject arbitrary web script or HTML via the (1) status parameter to admin/orders.php, (2) search parameter to admin/customers.php, or (3) STORE_NAME parameter to admin/configuration.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.htbridge.ch/advisory/xss_vulnerability_in_vam_shop_2.html | exploit |
http://osvdb.org/70429 | vdb entry exploit |
http://www.htbridge.ch/advisory/xss_vulnerability_in_vam_shop_1.html | exploit |
http://secunia.com/advisories/42869 | third party advisory vendor advisory |
http://osvdb.org/70430 | vdb entry |
http://www.securityfocus.com/archive/1/515615/100/0/threaded | mailing list exploit |
http://www.htbridge.ch/advisory/xss_vulnerability_in_vam_shop.html | exploit |
http://www.securityfocus.com/archive/1/515619/100/0/threaded | mailing list exploit |
http://www.securityfocus.com/archive/1/515620/100/0/threaded | mailing list |
http://www.exploit-db.com/exploits/15968 | exploit |