E-Commerce Exchange QuickCommerce 2.5/3.0,McMurtrey/Whitaker & Associates Cart32 2.5 a/3.0,Shop Express 1.0,StoreCreator 3.0 Web Shopping Cart Hidden Form Field Vulnerability source: https://www.securityfocus.com/bid/1237/info* Various shopping cart applications use hidden form fields within the html source code with preset parameters which contain product information. For example: price, weight, quantity, identification etc. If a remote user saves the web page of a particular item to their machine it is possible for them to edit the html source, consequently allowing them to alter the parameters of the product. The modified web page can then be submitted to the shopping cart application. It is also possible in some circumstances to exploit this vulnerability via any regular browser's address bar. Some vendors have built in checks that require the post method or the check refer field, both these requirements can be defeated via custom built http requests. \n\n"; print " Host: $host\n Port: [$port]\n Method: [$method]\n Path: [$path]\n"; print " Referer: [$refer]\n Client: [$client]\n Cookie: [$cookie]\n"; print " Data: [$data]\n"; print "\n"; print "

Results of operation:


\n"; print "$raw\n"; ?>