PayProCart contains a flaw that allows a remote cross site scripting attack. This
flaw exists because the application does not validate 'sgnuptype' variables upon
submission to the 'usrdetails.php' script. This could allow a user to create a
specially crafted URL that would execute arbitrary code in a user's browser within
the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery is credited to Diabolic Crab <email@example.com>.
ProfitCode Software PayProCart 3.0
PayProCart is prone to a cross-site scripting vulnerability affecting the 'usrdetails.php' script.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
PayProCart version 3.0 is affected by this issue. Other versions may be affected as well.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.