One more flaw in Happymall

From: Julio Cesar (e2fsckat_private)
Date: Mon May 12 2003 - 09:19:49 PDT

  • Next message: Vision Through Sound: "[Full-Disclosure] Paper: Spamdoors"

    
     ('binary' encoding is not supported, stored as-is)
    Happymall E-Commerce Directory Transversal Bug and Cross-site scripting
    
    Vendor: Happycgi.com
    
    Product: Happymall
    
    Versions: 4.3, 4.4 (patched version too)
    
    'normal_html.cgi' doesn't filter user-supplied input. The well-known 
    directory transversal
    and cross-site scripting (XSS) vulnerabilities are present in Happymall 
    (patched version too).
    
    The impact is that attackers can read files on the system and use XSS 
    tricks to steal
    cookies and other informations.
    
    An example: /shop/normal_html.cgi?file=../../../../../../etc/issue%00
    	    /shop/normal_html.cgi?file=<script>alert("XSS")</script>
    
    Even happycgi.com is vulnerable to these bugs.
    
    Solution: I have contacted CERTCC-KR.
    
    Greetings: y0Rk, iplogd, rfds, VUGO, psaux, romer, cronus, Sh0dan, jo3y_, 
    psyc, Red_Hat BoLoDoRio, c7g, C0VER, SaintsLD, sarkastics, B_Real and 
    #xcorp @ BRASNet :)
    
    Julio "e2fsck" Cesar, <e2fsckat_private>
    e2fsck @ irc.brasnet.org
    
    				san dimas high school football rules
    



    This archive was generated by hypermail 2b30 : Mon May 12 2003 - 11:08:32 PDT