{"vuid":"VU#924124","idnumber":"924124","name":"X-Cart contains multiple vulnerabilities","keywords":["x-cart","xss","cwe-79","cwe-639","insecure direct object reference"],"overview":"X-Cart versions 5.1.6 through 5.1.10 are vulnerable to cross-site scripting (XSS), and versions 5.1.10 and below are vulnerable to authorization bypass.","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2015-0950 X-Cart versions 5.1.6 through 5.1.10 contain a reflected cross-site scripting (XSS) vulnerability. An attacker can inject arbitrary script via the query string parameter substring in admin.php. CWE-639: Authorization Bypass Through User-Controlled Key - CVE-2015-0951 X-Cart versions 5.1.10 and below contain an insecure direct object reference vulnerability. An attacker can obtain or delete address data associated with other user accounts by manipulating parameters in requests to update or remove addresses. The CVSS score below reflects this issue.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session. A remote, authenticated attacker may be able to obtain or remove data associated with other users' accounts.","resolution":"Apply an update The vendor has released X-Cart 5.1.11 to address the vulnerabilities. Users are advised to upgrade.","workarounds":"","sysaffected":"","thanks":"Thanks to Yasser Ali for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://www.x-cart.com/","https://blog.x-cart.com/5-1-11-released.html","http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/639.html"],"cveids":["CVE-2015-0950","CVE-2015-0951"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-01-09T13:43:51Z","publicdate":"2015-04-02T00:00:00Z","datefirstpublished":"2015-04-02T15:47:00Z","dateupdated":"2015-04-02T15:47:01Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.5","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","cvss_temporalscore":"4.8","cvss_environmentalscore":"3.63898031306257","cvss_environmentalvector":"CDP:N/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}