Document Title: =============== VamCart v0.9 CMS - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=622 Release Date: ============= 2012-06-24 Vulnerability Laboratory ID (VL-ID): ==================================== 622 Common Vulnerability Scoring System: ==================================== 4 Product & Service Introduction: =============================== VamCart is a Free, Open Source, CakePHP Based Shopping Cart Content Management System. VamCart is a Open Source Project under the GNU GPL license with the following features ... Easy Installation. SEO - Search Engine Optimization. Unlimited Categories, Products. CakePHP, MVC, Smarty. Multi Language, Multi Currency. Templatable. Open Source. Automatic Image Resize. Product Reviews. Coupons ... (Copy of the Vendor Homepage: http://vamcart.com ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the VamCart v0.9 Content Management System. Vulnerability Disclosure Timeline: ================================== 2012-06-25: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple persistent input validation vulnerabilities are detected in the VamCart v0.9 Content Management System. The bugs allow remote attackers to implement/inject malicious script code on the application-side (persistent). The persistent vulnerabilities are located in the manage accounts, manage coupons, view orders or order comments module(s) with the bound vulnerable parameters comment text, coupon code, title & name. Exploitation requires low user inter action & privileged application user account. Successful exploitation of the vulnerability can lead to session hijacking (admin) or stable (persistent) context manipulation. Vulnerable Module(s): [+] Account > Manage Accounts > Admins Listing [+] Manage Coupons & Listing [+] View All Orders Listing [+] Order Comments Listing Vulnerable Module(s): [+] Title [+] Name [+] Coupon Code [+] Comments Text Proof of Concept (PoC): ======================= The persistent input validation vulnerabilities can be exploited by low privileged user accounts with low required user inter action. For demonstration or reproduce ... Review: Users [View All] INDEX - Account Listing Title Actionadmin Delete ">