Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cr3q-658v-qv3x

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

OpenCart-Overclocked Cross-site Scripting Vulnerability

Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.

The OpenCart Overclocked OpenBay template overly trusts user-controlled input. This lack of sufficient sanitisation allows an attacker to execute JavaScript code in the context of a victim’s browser.

The code below displays unsanitised input being displayed on the victim’s page (found on line 95 upload/admin/view/template/extension/openbay.tpl#L95):

var token = "<?php echo $_GET['token']; ?>";

Пакеты

Наименование

villagedefrance/opencart-overclocked

composer
Затронутые версииВерсия исправления

<= 1.11.1

Отсутствует

EPSS

Процентиль: 50%
0.00266
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
больше 7 лет назад

OpenCart-Overclocked version <=1.11.1 contains a Cross Site Scripting (XSS) vulnerability in User input entered unsanitised within JS function in the template that can result in Unauthorised actions and access to data, stealing session information, denial of service. This attack appear to be exploitable via Malicious input passed in GET parameter.

EPSS

Процентиль: 50%
0.00266
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79