[Plugin: Cart66 Lite :: WordPress Ecommerce] Cross scripting vulnerability
-
On the latest updates of this plugin, I am getting an alert from godaddy’s site scanner, that says that the site is vulnerable to cross scripting attacks. On all of the code that they showed me, it has to do with this shopping cart, and never happened before the update. I like this shopping cart, but this needs to be fixed.
This is what they said:
Thank you for bringing this issue to our attention. Upon testing with the provided parameters, it does appear that your site is vulnerable to Cross Site Scripting attacks. The following URL’s will demonstrate this issue.https://coindealsforyou.com/currency/us-currency/?’><script>alert(555);</script>=1
XSS (Cross Site Scripting) flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation and escaping. XSS allows attackers to execute script in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.
In order to prevent this type of attack you will need to ensure that untrusted data is kept separate from browser content. The following is recommended:
1. The best option is to properly escape all untrusted data based on the HTML context (body, attribute, JavaScript, CSS, or URL) that the data will be placed into. Unless your UI framework does this for you, your developers will need to include this escaping in your application.
2. The use of positive or “whitelist” input validation with appropriate canonicalization (decoding) can also help to protect against XSS. Please note that this is not a complete defense as many applications will require special characters in their input. Whenever possible validation should decode any encoded input, and then validate the length, characters, format, and any additional business rules on the data before it is accepted as input.
- The topic ‘[Plugin: Cart66 Lite :: WordPress Ecommerce] Cross scripting vulnerability’ is closed to new replies.