Cross-Site Scripting Vulnerability in Zen Cart 1.5.7
Advisory by Netsparker (now Invicti)
Name: Cross-Site Scripting Vulnerability in Zen Cart 1.5.7
Affected Software: Zen Cart
Affected Versions: 1.5.7
Vulnerability: Cross-Site Scripting
CVSS Score (3.0): AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Invicti Advisory Reference: NS-21-002
Zen Cart 1.5.7 was improperly sanitizing user input in HTTP GET parameter names, which led to a Cross-Site Scripting (XSS) vulnerability in the admin area. The impact of this vulnerability is lessened due to the fact that the name of the admin panel must be set to a random or user-supplied name.
Resolution: The vulnerability is fixed in Zen Cart v1.5.7c.
Scope: It affected only users of Zen Cart v1.5.7, v1.5.7a, and v1.5.7b.
Fix: Users can consult the release announcement for guidance on applying the patched files related to upgrading to v1.5.7c
For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).
5th February 2021 – First Contact
21st April 2021 – Vulnerability Fixed
25th May 2021 – Advisory Released
Credits & Authors
These issues have been discovered by Sven Morgenroth while testing the Invicti Web Application Security Scanner.
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.