HTTP: cart32 Client Information Disclosure

This signature detects attempts to exploit the cart32.exe vulnerability in the McMurtrey/Whitaker & Associates Cart32 shopping cart. Attackers can access a secret password embedded in cart32.exe to retrieve credit card details, shipping data, and other sensitive client information.

Extended Description

Various shopping cart applications use hidden form fields within the html source code with preset parameters which contain product information. For example: price, weight, quantity, identification etc. If a remote user saves the web page of a particular item to their machine it is possible for them to edit the html source, consequently allowing them to alter the parameters of the product. The modified web page can then be submitted to the shopping cart application. It is also possible in some circumstances to exploit this vulnerability via any regular browser's address bar. Some vendors have built in checks that require the post method or the check refer field, both these requirements can be defeated via custom built http requests.

Affected Products

Zilron storecreator

Short Name
HTTP:PKG:CART32-CLI-DIS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2000-0429 Client Disclosure Information bid:1237 cart32
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Mcmurtrey/whitaker_&_associates

E-commerce_exchange

Zilron

Shop_express

CVSS Score

7.5

Found a potential security threat?