OneWorldStore 'sIDSearch' DisplayResults.asp XSS and SQL injection

Monday, April 18, 2005
################################################
OneWorldStore DisplayResults.asp sIDSearch Variable XSS and SQL Injection
vendor url:http://oneworldstore.com/
vendor notified : yes exploit available: yes
advisory:http://lostmon.blogspot.com/2005/04/
oneworldstore-sidsearch.html
OSVDB ID: 15659 and 15660
Securitytracker:1013754
secunia:SA14969
BID:13251 and 13249
################################################

related vendor´s security bulletin:
http://oneworldstore.com/support_security_issue_updates.asp

Found during an internal test when documenting and testing latest
vulnerabilities found by Diabolic Crab ( reference:
http://www.digitalparadox.org/advisories/ows.txt)

good work Diabolic !!

oneWorldStore is a powerful desing asp shopping cart.

oneWorldStore contains a flaw that allows a remote cross site
scripting attack and sql inject comands.This flaw exists because
the application does not validate 'sIDSearch' upon submission to
the '/owSearch/DisplayResults.asp' script.This could allow a user
to create a specially crafted URL that would execute arbitrary code
in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

##########
versions:
##########

OneWorldStore unknow version

some versions here:
http://oneworldstore.com/products_price_list.asp

also is posible what others versions are afected.

##########
solution:
##########

vendor´s fix/patch see :
http://www.oneworldstore.com/
support_security_issue_updates.asp


http://www.oneworldstore.com/support_updates.asp

http://www.oneworldstore.com/updatezips/Security
Update_Apr_18_2005_All_Editions.zip

timeline:

discovered : 15 april 2005
vendor notify : 18 april 2005 (web form)
vendor response: 18 april 2005
vendor patch/fix: 18 april 2005
disclosure: 18 april 2005

####################
proof of concept:
###################

SQL INJECTION:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=15%20or%201=1 //command execution !!

Cross-site scripting:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=15
"><META%20HTTP-EQUIV=Refresh%20CONTENT=0>

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=1
"><h1>lalala</h1>

##########################
related vendor response :
##########################
From: Dean Higginbotham
To: Lostmon@gmail.com
Date: Apr 18, 2005 7:28 PM
Subject: RE: OneWorldStore Support Inquiry -- Technical

Lostmon,

I've applied several fixes to these files:
/owSearch/DisplayResults.asp
/owSearch/PrepareResults.asp
The fixes have been applied to all Editions.

Fixes include:
1. Converting all numeric inputs from form or QueryString text to
actual numeric data types. If the data is nonnumeric or blank,
it converts it to a 0.

2. Trimming all text inputs from form or QueryString. Trimming
keywords to 250 characters. Trimming flags to one character.
Trimming sort criteria (SOHO, Business & Enterprise only) to 20
characters.

3. Displaying all text that has passed through a form or QueryString
using the Server.HTMLEncode() filter.

I have also added these patched files to an update within our member
section on the site. In a few minutes I am also going to add it to our
security announcement page so people know about it:
http://www.oneworldstore.com/support_security_issue_updates.asp

Would you also still release your findings on your site? And say that
there is a patch on our site (I've also attached it to this email if you
would like to review it)? Because we want people who have downloaded
the Free and Basic Editions to be able to know about the patch. And we
do not have email addresses for any people who downloaded the Free
Edition, and very few for the Basic Edition.
####################################

############
thnx
############

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
thnx to vendor very fast respose and very fast release a fix good work !!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....

Latest OSVDB Vulnerabilities

 

Browse

About:Me

My blog:http://lostmon.blogspot.com
Mail:Lostmon@gmail.com
Lostmon Google group
Lostmon@googlegroups.com

La curiosidad es lo que hace
mover la mente...