SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Commerce)  >   OneWorldStore Vendors:   OneWorldNet.com
OneWorldStore Input Validation Flaw in 'sIDSearch' Permits SQL Injection and Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1013754
SecurityTracker URL:  http://securitytracker.com/id/1013754
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 19 2005
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Lostmon reported some input validation vulnerabilities in OneWorldStore. A remote usre can conduct cross-site scripting attacks. A remote user can also inject SQL commands.

The 'DisplayResults.asp' script does not properly validate user-supplied input in the 'sIDSearch' variable. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the OneWorldStore software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

http://[target]/owSearch/DisplayResults.asp?sIDSearch=3D15
"><META%20HTTP-EQUIV=3DRefresh%20CONTENT=3D0>

http://[target]/owSearch/DisplayResults.asp?sIDSearch=3D1
"><h1>lalala</h1>

A remote user can also submit certain SQL commands to be executed on the underlying database. A demonstration exploit URL is provided:

http://[target]/owSearch/DisplayResults.asp?sIDSearch=3D15%20or%201=3D1

[Editor's note: The vendor indicates that only product and category data can be obtained and that no sensitive data can be obtained via this method.]

The vendor was notified on April 18, 2005 and issues a fix on the same day.

The original advisory is available at:

http://lostmon.blogspot.com/2005/04/oneworldstore-sidsearch.html

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the OneWorldStore software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can execute SQL commands on the underlying database.

Solution:   The vendor has issued a fix, available at:

http://www.oneworldstore.com/updatezips/SecurityUpdate_Apr_18_2005_All_Editions.zip

The vendor's advisory is available at:

http://oneworldstore.com/support_security_issue_updates.asp

Vendor URL:  oneworldstore.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  OneWorldStore 'sIDSearch' DisplayResults.asp XSS and sql injection


 ################################################
OneWorldStore DisplayResults.asp sIDSearch Variable XSS and SQL Injection
vendor url:http://oneworldstore.com/
vendor notified : yes exploit available: yes
advisory:http://lostmon.blogspot.com/2005/04/
oneworldstore-sidsearch.html
OSVDB ID: 15659 and 15660
################################################

related vendor=B4s security bulletin:
http://oneworldstore.com/support_security_issue_updates.asp

Found during an internal test when documenting and testing latest
vulnerabilities found by Diabolic Crab ( reference:
http://www.digitalparadox.org/advisories/ows.txt)

good work Diabolic !!

oneWorldStore is a powerful desing asp shopping cart.

oneWorldStore contains a flaw that allows a remote cross site
scripting attack and sql inject comands.This flaw exists because
the application does not validate 'sIDSearch' upon submission to
the '/owSearch/DisplayResults.asp' script.This could allow a user
to create a specially crafted URL that would execute arbitrary code
in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

##########
versions:
##########

OneWorldStore unknow version

some versions here:
http://oneworldstore.com/products_price_list.asp

also is posible what others versions are afected.

##########
solution:
##########

vendor=B4s fix/patch see :
http://www.oneworldstore.com/
support_security_issue_updates.asp

http://www.oneworldstore.com/support_updates.asp

http://www.oneworldstore.com/updatezips/Security
Update_Apr_18_2005_All_Editions.zip

timeline:

discovered : 15 april 2005
vendor notify : 18 april 2005 (web form)
vendor response: 18 april 2005
vendor patch/fix: 18 april 2005
disclosure: 18 april 2005

####################
proof of concept:
###################

SQL INJECTION:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=3D15%20or%201=3D1
//command execution !!

Cross-site scripting:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=3D15
"><META%20HTTP-EQUIV=3DRefresh%20CONTENT=3D0>

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=3D1
"><h1>lalala</h1>

##########################
related vendor response :
##########################
From: Dean Higginbotham
To: Lostmon@gmail.com
Date: Apr 18, 2005 7:28 PM
Subject: RE: OneWorldStore Support Inquiry -- Technical

Lostmon,

I've applied several fixes to these files:
/owSearch/DisplayResults.asp
/owSearch/PrepareResults.asp
The fixes have been applied to all Editions.

Fixes include:
1. Converting all numeric inputs from form or QueryString text to
actual numeric data types. If the data is nonnumeric or blank,
it converts it to a 0.

2. Trimming all text inputs from form or QueryString. Trimming
keywords to 250 characters. Trimming flags to one character.
Trimming sort criteria (SOHO, Business & Enterprise only) to 20
characters.

3. Displaying all text that has passed through a form or QueryString
using the Server.HTMLEncode() filter.

I have also added these patched files to an update within our member
section on the site. In a few minutes I am also going to add it to our
security announcement page so people know about it:
http://www.oneworldstore.com/support_security_issue_updates.asp

Would you also still release your findings on your site? And say that
there is a patch on our site (I've also attached it to this email if you
would like to review it)? Because we want people who have downloaded
the Free and Basic Editions to be able to know about the patch. And we
do not have email addresses for any people who downloaded the Free
Edition, and very few for the Basic Edition.
####################################

############
thnx
############

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
thnx to vendor very fast respose and very fast release a fix good work !!
--=20
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC