Short Name |
HTTP:PKG:CART32-CLI-DIS |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
cart32 Client Information Disclosure |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit the cart32.exe vulnerability in the McMurtrey/Whitaker & Associates Cart32 shopping cart. Attackers can access a secret password embedded in cart32.exe to retrieve credit card details, shipping data, and other sensitive client information.
Various shopping cart applications use hidden form fields within the html source code with preset parameters which contain product information. For example: price, weight, quantity, identification etc. If a remote user saves the web page of a particular item to their machine it is possible for them to edit the html source, consequently allowing them to alter the parameters of the product. The modified web page can then be submitted to the shopping cart application. It is also possible in some circumstances to exploit this vulnerability via any regular browser's address bar. Some vendors have built in checks that require the post method or the check refer field, both these requirements can be defeated via custom built http requests.