![Quick.Cart](http://opensolution.org/os/templates/img/qc_logo3.png)
![Quick.Cms](http://opensolution.org/os/templates/img/qcms_log2.png)
Cross-site scripting vulnerability in Quick.Cart 6.0 & Quick.Cms 5.0 were found and described in High-Tech Bridge Advisory HTB23135. Both products (Quick.Cms and Quick.Cart) developed by OpenSolution team, suffers from this vulnerabilities.
The exploitation examples in PoC examples use JS alert()
function, nevertheless, a remote attacker can create an exploit for this vulnerability to bypass application's CSRF protection mechanism based on the HTTP Referer header and change administrator's password. Additional details can be found on researcher's page.
If you have installed Quick.Cms 5.0 and Quick.Cart 6.0 please make sure that they are released after December 19, 2012, because vendor fixed this 2 vulnerabilities without editing his Changelog. Latest unaffected versions: Quick.Cms v5.0 (release date 2012.12.20) and Quick.Cart v6.0 (release date 2012.12.21).
No comments:
Post a Comment