Korean
<< Back
VID 21173
Severity 20
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Agora.cgi CGI has a cross-site scripting vulnerability.
The Agora.cgi is a freely available, open source e-commerce shopping cart system.
Due to poor input validation, non-filtering HTML tags adequately, the Agora.cgi is vulnerable to a cross-site scripting attack. Debug mode is not enabled by default and must be explicitly turned on by an administrator. As a result, it is possible for an attacker to construct a link to the script that includes maliciously constructed script code. When the link is clicked by a web user, the script code will be executed by the client in the context of the site running Agora.cgi.
This issue may be exploited by an attacker to steal cookie-based authentication credentials, permitting the attacker to hijack an Agora.cgi session and perform actions as a legitimate user. This vulnerability is ONLY present when debug mode is enabled. The Agora.cgi 4.0e is not vulnerable.
Recommendation Upgrade to the latest version (4.0e and later) of Agora.cgi from http://www.agoracgi.com.
Related URL CVE-2001-1199 (CVE)
Related URL 3702 (SecurityFocus)
Related URL 7708 (ISS)