Image from Shutterstock.com Privacy & Security Zen Cart shopping cart issues patch to close XSS vulnerabilities Howard Solomon @HowardITWC Published: March 29th, 2016Open source software is no less vulnerable to security problems than commercial applications. Which is why IT personnel responsible for security need to keep an eye on every application their organization runs.The latest lesson in that comes from the popular open source Zen Cart shopping cart software, which has advised users to update their application to version 1.5.5 to fix possible multiple security vulnerabilities in the admin module.The problems, discovered by Trustwave and revealed last week, involve multiple Cross-Site Scripting (XSS) vulnerabilities in version 1.5.4 and possibly earlier ones. “Our researchers found both reflective and stored XSS in multiple parameters of number of requests,” Trustwave said. “Malicious Cross-Site Scripting injections could result in access to cookies, sensitive information and site defacement, which can result into further attacks.”There are a lot of places in Admin where Zen Cart allows the input of html/script tags, such as product descriptions/product names/email sending as well as some configuration values, the developer acknowledged. “While allowing these does mean there could be XSS vulnerabilities, this is further mitigated by the use of XSRF tokens in admin … and the requirement that one must be logged into the admin for this to be an issue at all.” Related Articles Linux systems have to be patched for latest Ghost vulnerabilityDo you have Linux on your systems? If so, your security team should pay attention to a security warning from... March 21st, 2016 Howard Solomon @HowardITWC Security industry has learned nothing from patching lapses: ReportThere's an old saying that those who don't remember the past are condemned to repeat it. If so, a lot... February 17th, 2016 Howard Solomon @HowardITWC Some point patches were released earlier. However, after a long discussion with with Trustwave, Zen Cart said it decided to add a better way to sanitize GET/POST parameters in Admin. Trustwave says there is still a single Cross-Site Scripting issue, but an attacker would need admin privileges to exploit it.Those changes can be seen in the admin/includes/init_incudes/init_sanitize.php and admin/includes/classes/AdminRequestSanitizer.php files of the new v155 release, it said. There is also documentation about the new sanitzation at http://docs.zen-cart.com/Developer_D…n_sanitizationThe patch, available here, applies to Zen Cart versions as far back as 1.5.0.Often used by small businesses, Zen Cart says it can be installed and set-up “by anyone with the most basic web site building and computer skills.” It also integrates with many payment gateways.Would you recommend this article?00 Thanks for taking the time to let us know what you think of this article! We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →Jim Love, Chief Content Officer, IT World Canada Related Download Sponsor: CanadianCIO Cybersecurity Conversations with your Board – A Survival Guide A SURVIVAL GUIDE BY CLAUDIO SILVESTRI, VICE-PRESIDENT AND CIO, NAV CANADA Download Now Privacy & Security patching, security strategies