In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can display users password in user editing page.
The vendor was notified early about this vulnerability, but didnt respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
The product stores a password in plaintext within resources such as memory or files.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Quick.cart | Opensolution | 6.7 (including) | 6.7 (including) |