Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:CGI:SPIDERSALES

Severity

Medium

Recommended

No

Category

HTTP

Keywords

SpiderSales Shopping Cart Code Injection

Release Date

2005/01/28

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: SpiderSales Shopping Cart Code Injection


This signature detects attempts to exploit a known vulnerability in SpiderSales Shopping Cart Web application, which does not correctly sanitize inputs for userid. Attackers can remotely execute malicious commands on the server.

Extended Description

Multiple vulnerabilities have been identified in the application that may allow an attacker to obtain the private cryptographic key and gain access to sensitive information. The application is also reported prone to an SQL injection vulnerability that may allow an attacker to gain administrative level access to the underlying database. The issues exist due to improper implementation of the RSA cryptosystem by SpiderSales and failure to sanitize user-supplied input via the 'userId' URI parameter employed by various scripts. SpiderSales version 2.0 is assumed to be vulnerable to these issues, however, other versions could be affected as well.

Affected Products

  • SpiderSales 2.0.0

References

  • BugTraq: 9799
  • CVE: CVE-2004-0348
  • URL: http://www.securityfocus.com/archive/1/356084

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out