Ecommerce software home
Shopping Cart Software Forum for Ecommerce Templates
 
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

Find us on Facebook Follow us on Twitter View our YouTube channel
Search our site
Forum Search
Google Site Search
Author « Topic »  

midvalleydrifter001
Ecommerce Template Expert

USA
967 Posts

Posted - 12/17/2025 :  10:57:18  
My recent PCI scan has failed with some new issues of which I have no idea how to address.

ECT v7.9.1
PHP 8.3.28

Thanks, Patrick


#1 Threat
Insecure configuration of Cookie attributes
Impact
A Cookie Vulnerability helps an attacker to gain access to session information stored in cookies. It may also be used as a 'locator' attack that precedes a Cross-Site Scripting (XSS) or Man-In-The-Middle attack. When looking for Cookie Vulnerabilities, an attacker will first observe cookies through various HTTP proxies and check their attributes. The attacker will then try to steal cookies of various users by employing multiple attacks. If successful, he/she may be able to get sensitive information which can be further used in an illegitimate way.
Solution
It is important to set Secure and HTTPOnly flags for all the cookies on the application. The Secure flag prevents cookies from being transmitted over clear text. An HTTPOnly flag would limit cookie access in cases of Cross-Site Scripting issues. Proper Caching headers should be set for responses carrying the cookie. Cookies set on the client side should also contain Secure and HTTPOnly tags.

DetectionDetails: Cookie Vulnerabilities Found
ecttestcart = 2464
Path = /
Host = www.mywebsite.com
Cookie does not have an HTTPOnly Attribute
Cookie Change Observed on CLIENTside

Request: GET https://www.mywebsite.com/index.php HTTP/1.1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
Cookie: ECTTESTCART=2464; ectcartcookie=c83e9522f4223712a06e52b308; PHPSESSID=t1ah2c0c0vpdh2oi8ukleit2r3

location: https://www.mywebsite.com/index.php



#2 Threat
Boolean Based SQL Injection Vulnerability
Impact
A SQL injection vulnerability (SQLi) was identified in this web application. SQL injection is when modified SQL syntax is supplied to a user defined parameter to have it query the SQL database directly, which is not the desired intent of the web application. A simple proof of concept example of this would be for a user to supply "' or SELECT DATABASES;--" to a user defined parameter and then upon submission, a list of databases on the system would be supplied for the user because the SQL query was interpreted directly on the SQL server instance. SQL injection can be found in many different forms and combinations so the full request and response that was used demonstrate this vulnerability has been provided below as evidence.

DetectionDetails: Boolean based SQL vulnerability found
GET - https://www.mywebsite.com/proddetail.php?prod=Slixprings-Main-Hammer-Spring-Installation-Instructions+and+2371%3D5793+%2F* - prod
False Injection: Slixprings-Main-Hammer-Spring-Installation-Instructions and 2371=5793 /*
True Injection: Slixprings-Main-Hammer-Spring-Installation-Instructions and 5647=5647 /*
True and false injections produced different responses



#3 Threat
Server Banner Disclosure
Impact
Many times server banner includes a version number of the server or the technology used. Information of known security issues for particular versions of servers are available on various security forums. Even if such version number is not present, knowing the server or technology may help the attacker to perform more focused attacks.
Solution
Always configure the web servers to not disclose more information about the server from the response headers

DetectionDetails: Found Server banner with no version information.

GET https://www.mywebsite.com/vsadmin/admin.php
Server: nginx

Request: GET https://www.mywebsite.com/vsadmin/admin.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
Referer: https://www.mywebsite.com/vsadmin/

location: https://www.mywebsite.com/vsadmin/admin.php


  « Topic »  
Jump To:
Shopping Cart Software Forum for Ecommerce Templates © 2002-2022 ecommercetemplates.com
This page was generated in 0.02 seconds. Snitz Forums 2000