-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Agoracgi v3.3e Cross Site Scripting Vulnerability Type: Cross Site Scripting Release Date: December 18, 2001 Product / Vendor: Agora.cgi is an open source ecommerce solution. Steve Kneizys is the principle author of this project. The project grew from a couple of other open source projects. http://www.agoracgi.com Summary: Cross Site Scripting, most dynamic websites are still not filtering user input. This lets remote sites access towrite scripts on vulnerable sites & application, stealing cookies, performing actions on behalf of user or modifying look of content on site. http://www.agoracgi.com/store/agora.cgi?cart_id=<IMG%20height=47%20src ="http://www.securityoffice.net/images/title.gif"%20width=406%20border =0>&xm=on&product=HTML http://www.agoracgi.com/store/agora.cgi?cart_id=<script>alert(document .cookie)</script>&xm=on&product=HTML Tested: Agoracgi v3.3e Vulnerable: Agoracgi v3.3e (And may be other) Disclaimer: http://www.securityoffice.net is not responsible for the misuse or illegal use of any of the information and/or the software listed on this security advisory. Author: Tamer Sahin ts@securityoffice.net http://www.securityoffice.net Tamer Sahin http://www.securityoffice.net PGP Key ID: 0x2B5EDCB0 Fingerprint: B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0 -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com> iQA/AwUBPB5V+buLpFMrXtywEQInVgCfSWnIa3wUDvwSoDwU7wYkhUG85MgAoI85 L9mB+t3g5i0Ea+Rn8o31y4Fx =RdM5 -----END PGP SIGNATURE-----