CACTUSHOP 6 Default Installation Allows Remote Database Disclosure

2007-06-08 / 2007-06-09
Credit: DoZ
Risk: Medium
Local: Yes
Remote: Yes
CWE: CWE-255


Ogólna skala CVSS: 7.8/10
Znaczenie: 6.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

Cactushop (V6) allows remote users to download the database which contains creditcard numbers and critical information. The affected carts default installation gives away the path to database file. As a result, an attacker exploiting this vulnerability will be able to obtain detailed private customer information, including credit card numbers, order details, addresses, telephone numbers, etc. Hackers Center Security Group (http://www.hackerscenter.com) Credit: Doz Remote: YES Class: Improper Instalation configuration. Vendor: WWW.CACTUSHOP.COM Product: CACTUSHOP v.6 ASP SHOPPING CART Path Disclosure Exploits: - http://target.com/path_to_cart/database/cactushop6.mdb * Privous version v.5 is effected and older might also be effected. - http://target.com/path_to_cart/database/cactushop5.mdb * Attackers can exploit these issues via a web client. Proff of Concept: http://i12.tinypic.com/5x8nxp5.jpg Only becoming a hacker you can stop a hacker. Were can you learn with out having to pay thousands?- http://kit.hackerscenter.com/ - The most comprehensive security pack you will ever find on the net!


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top