HTTP: cart32 Client Information Disclosure
This signature detects attempts to exploit the cart32.exe vulnerability in the McMurtrey/Whitaker & Associates Cart32 shopping cart. Attackers can access a secret password embedded in cart32.exe to retrieve credit card details, shipping data, and other sensitive client information.
Extended Description
Various shopping cart applications use hidden form fields within the html source code with preset parameters which contain product information. For example: price, weight, quantity, identification etc. If a remote user saves the web page of a particular item to their machine it is possible for them to edit the html source, consequently allowing them to alter the parameters of the product. The modified web page can then be submitted to the shopping cart application. It is also possible in some circumstances to exploit this vulnerability via any regular browser's address bar. Some vendors have built in checks that require the post method or the check refer field, both these requirements can be defeated via custom built http requests.
Affected Products
Zilron storecreator
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Mcmurtrey/whitaker_&_associates
E-commerce_exchange
Zilron
Shop_express
7.5