| ||||||||||
Shopping cart software Solutions for online shops and malls | ||||||||||
|
X-Cart Home | FAQ | Forum rules | Calendar | User manuals | Login |
security bulletin - 3.3.0 up to 4.0.11 | ||||
|
|
Thread Tools |
#1
|
|||||||||
|
|||||||||
security bulletin - 3.3.0 up to 4.0.11
Dear Customer,
This bulletin contains the latest security advisory for X-Cart users. DESCRIPTION: Recently several vulnerabilities of Cross Site Scripting (CSS) nature were discovered in X-Cart software. The vulnerability is caused by insufficient validation of input data. It can be exploited if a malicious person lures a customer to click on a specially crafted link located on a third party site or inside an email message that leads to the site with X-Cart software. This can result in a third party HTML or JavaScript code getting executed in the customer's browser that can be used for password or email fishing. No remote access or unauthorized data disclosure can be gained as a direct result of this vulnerability. SEVERITY: Moderate CONDITIONS: Using IE browser. IMPACT: Third party HTML code or JavaScript can be injected and executed in the customer's browser if he follows a specially crafted link provided by a malicious person. AFFECTED VERSIONS: X-Cart versions since 3.3.0 up to 4.0.11 SOLUTION: If your version is affected by this issue: 1) Download the patch archive file <xcart_security_fix_3.3.0-4.0.11_20050127.tgz> from your personal Help Desk account at https://secure.qualiteam.biz/ (Updates section of the file area) 2) Uncompress the archive. 3) Replace the script file 'globals.php' or 'prepare.php' (depending on the version of your X-Cart) located in the root directory of your X-Cart installation with an updated version of this file from the uncompressed archive folder (by overwriting). The archive file <xcart_security_fix_3.3.0-4.0.11_20050127.tgz> contains fixes for all the affected versions.
__________________
Looking for a reliable X-cart host ? You wont go wrong with either of these. EWD Hosting Hands On Hosting |
|||||||||
#2
|
|||||||
|
|||||||
__________________
ex x-cart guru |
|||||||
#3
|
|||||||
|
|||||||
3.5.xx code causes an infinite loop that throws up the error:
redirection limit for this url exceeded unable to load .....
__________________
ex x-cart guru |
|||||||
#4
|
|||||||
|
|||||||
Can someone explain how this is only moderate ???
__________________
X-Cart 5.3.x |
|||||||
#5
|
|||||||
|
|||||||
I've tried to use the 3.5.x version of prepare.php on my 3.5.4 installation and all I get is "page cannot be displayed" after a few seconds. Hopefully this won't be a security update I have to pay to have done . Anyone else have problems?
Dan
__________________
4.4.2 and 4.6.1 |
|||||||
#6
|
|||||||
|
|||||||
yes i have on any site that i have put it on
have had to wind it back out because of the url redirection error. xcart - can you fix your fix please? ffs
__________________
ex x-cart guru |
|||||||
#7
|
|||||||
|
|||||||
Well, at least it's not serious, being classed as "moderate"...I mean, it's not as if they can get the admin password or anything important
__________________
4.4.2 and 4.6.1 |
|||||||
#8
|
|||||||
|
|||||||
Quote:
The one and only way to exploit it is to make a customer follow a link to your store using an URL provided by malicious person. Sample 1: a hacker sends someone a link to your store by e-mail. The link will not look like www.yourstore.com, but www.yourstore.com/path/?a_lot_of_hackers_java_script_code_in_the URL. If the customer visits the link sent to him by a hacker, hacker will be able to track the information he enters during the visit to your store. Sample 2: a hacker puts a link on his site to your store. The link is corrupted, as in above sample. A person who visits hacker's site clicks the link, everything else is like in the sample#1. There is no way to exploit this without: 1) Without hacker having to promote your store and promote it successfully, i.e. attracting new customers. 2) Without your customer trusting the hacker. So, I would even call this quite a minor vulnerability. There is no known cases of ones who managed to exploit this vulnerability. The only reason why we did sent out the security notification is that our policy is to ALWAYS notify the customer about all known security issues. |
|||||||
#9
|
|||||||
|
|||||||
Ruslan
Thanks for the reply Can you confirm that your team are correcting the problem with the 3.5.x prepare.php script?
__________________
ex x-cart guru |
|||||||
#10
|
|||||||
|
|||||||
Thanks Ruslan,
IMO, those examples don't sound too difficult for a hacker to do (correct me if I'm wrong). Hypethetically speaking, if someone wanted to target my store to steal the admin password, they could send an effective looking spam email to a few thousand email addresses to get people to visit the store e.g. with an attractive offer. The fact that my server newgroup mentioned this issue this morning says that the word on this vulnerability is spreading, so the more chance there is for an exploit. Like funkydunk, I'm also hoping there will be a fix for the 3.5.x file. Thanks Dan
__________________
4.4.2 and 4.6.1 |
|||||||
|
|||
X-Cart forums © 2001-2020
|