XSS in shoppica2

This topic has been marked as not resolved.

This is a results from McAfee secure regarding XSS from shoppica2

The goal of this test is to verify unsuccessful input validation. In many cases, the demo does may not test successfully in the browser to prove vulnerability. Newer browsers will encode attack strings on the fly in order to prevent attacks from working properly. The end result is the browser makes the demo tool seem like it’s not working.

Luckily, there are other tools that can mimic the findings of the scanner. In these cases you would have to use a proxy tool to make the adjustments to the request, or you can use the commandline tool called cURL (commandline URL) in order to replicatethe issue. The curl commandline is useful since it does not use XSS evasion techniques. It’s available with Unix/Linux platforms also with Cygwin (for windows).

The following example will make a specially crafted request and will filter out all lines except those which contain the attack string and may include five lines before/after it to help pinpoint its location in the page:

$ curl –max-time 10 -iskL ‘http://www.apasaja.biz/catalog/view/theme/shoppica2/stylesheet/ie.css.php?v=2.2.2&theme=>”>’ –header “Referer: http://www.apasaja.biz/” | egrep -B5 ‘”>/javascript/pie/PIE.php);

How to resolve this?

May 13, 2013 at 6:13 pm #23113

Replace catalog/view/theme/shoppica2/stylesheet/ie.css with the attached file. Thanks for the spot.

Regards,
ThemeBurn team

May 14, 2013 at 4:46 pm #23168

Hi thanks for your help, I will resubmit the test again after this, and will inform to you later, after the test is completed.

May 14, 2013 at 7:01 pm #23175
Viewing 3 posts - 1 through 3 (of 3 total)
  • You must be logged in to reply to this topic.