Vulnerabilities > CVE-2005-0606 - Cross-Site Scripting vulnerability in CubeCart

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
devellion
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in settings.inc.php for CubeCart 2.0.0 through 2.0.5, as used in multiple PHP files, allows remote attackers to inject arbitrary HTML or web script via the (1) cat_id, (2) PHPSESSID, (3) view_doc, (4) product, (5) session, (6) catname, (7) search, or (8) page parameters.

Exploit-Db

descriptionCubeCart 2.0.x Multiple Cross-Site Scripting Vulnerabilities. CVE-2005-0606. Webapps exploit for php platform
idEDB-ID:25162
last seen2016-02-03
modified2005-02-25
published2005-02-25
reporterLostmon
sourcehttps://www.exploit-db.com/download/25162/
titleCubeCart 2.0.x - Multiple Cross-Site Scripting Vulnerabilities

Nessus

NASL familyCGI abuses
NASL idCUBECART_ADMIN_SETTINGS_XSS.NASL
descriptionAccording to its banner, the version of CubeCart installed on the remote host suffers from multiple cross-site scripting and path disclosure vulnerabilities due to a failure to sanitize user input in
last seen2020-06-01
modified2020-06-02
plugin id17260
published2005-03-03
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17260
titleCubeCart < 2.0.6 settings.inc.php Multiple Script XSS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(17260);
  script_version("1.21");

  script_cve_id("CVE-2005-0606", "CVE-2005-0607");
  script_bugtraq_id(12658);

  script_name(english:"CubeCart < 2.0.6 settings.inc.php Multiple Script XSS");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
multiple issues." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of CubeCart installed on the
remote host suffers from multiple cross-site scripting and path
disclosure vulnerabilities due to a failure to sanitize user input in
'admin/settings.inc.php', which is used by various scripts." );
 # http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b563b931" );
 script_set_attribute(attribute:"see_also", value:"https://forums.cubecart.com/topic/6032-cubecart-206-released/" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to CubeCart 2.0.6 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/03");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/02/25");
 script_cvs_date("Date: 2018/11/15 20:50:16");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/02/21");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:cubecart:cubecart");
script_end_attributes();

 
  script_summary(english:"Checks version of CubeCart");
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("cubecart_detect.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/cubecart");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(1, "The web server on port "+port+" does not support PHP");


# Test an install.
install = get_kb_item(string("www/", port, "/cubecart"));
if (isnull(install)) exit(0, "cubecart was not detected on port "+port);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  ver = matches[1];

  # If it's CubeCart 2.0.0 - 2.0.5, there's a problem.
  if (ver =~ "^2\.0\.[0-5]")
  {
    security_warning(port);
    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
  }
}