[] NeoSense

INFINICART - 'sendpassword.asp?email' Cross-Site Scripting

Author: laurent gaffie
type: webapps
platform: asp
port: 
date_added: 2006-11-13 
date_updated: 2013-10-16 
verified: 1 
codes: CVE-2006-5958;OSVDB-30381 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/21043/info

Infinicart is prone to multiple input-validation vulnerabilities, including HTML-injection and SQL-injection issues, because the application fails to properly sanitize user-supplied input.

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

The vendor reports that these issues affect only the demonstration version of Infinicart and do not affect any official released versions of the application.

in /infinicart-demo/sendpassword.asp :
email= &lt;/textarea&gt;&#039;"><script>alert(document.cookie)</script>