Web+ Shop 5.0 XSS vuln.
###############################################
Vuln. discovered by : r0t
Date: 8 april 2006
vendor:www.talentsoft.com/products/webplusshop/index.en.wml
affected versions:Web+ Shop 5.0 and previous
orginal advisory:http://pridels.blogspot.com/2006/04/web-shop-50-xss.html
###############################################
Vuln. description:
Web+ Shop contains a flaw that allows a remote cross site scripting attacks.
This flaw exists because input passed to "deptname" parameter isn't
properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust
relationship between the browser and the server, leading to a loss of
integrity.
example:
http://host.com/cgi-bin/webplus.exe?script=/webpshop/
department.wml&deptid=3&deptname=[XSS]
###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/