WHMCompleteSolution (WHMCS) 5.0 - Cross-Site Request Forgery (Multiple Application Function)

Author: Shadman Tanjim
type: webapps
platform: php
port: 
date_added: 2012-05-31  
date_updated: 2017-10-18  
verified: 1  
codes: OSVDB-83619  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 37337.txt  
source: https://www.securityfocus.com/bid/53740/info

WHMCS is prone to a cross-site scripting vulnerability and multiple HTML-parameter-pollution vulnerabilities because it fails to properly sanitize user-supplied input.

Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, control how the page is rendered to the user, and override existing hard-coded HTTP parameters which compromises the application.

WHMCS 5.0 is vulnerable; other versions may also be affected.

http://www.example.com/cart.php?a=add&domain=transfer&n913620=v992636

http://www.example.com/domainchecker.php?search=bulkregister&n946774=v992350

http://www.example.com/cart.php?currency=2&gid=1&n972751=v976696