Lucene search

K
githubGitHub Advisory DatabaseGHSA-7Q3H-J95Q-3VJH
HistoryJun 22, 2024 - 6:30 a.m.

Arbitrary File Creation in opencart

2024-06-2206:30:37
CWE-20
GitHub Advisory Database
github.com
5
opencart
arbitrary file creation
database restoration
php code injection
admin privileges
backup file
storage path.

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

17.7%

This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup.

Note:

It is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root.

Affected configurations

Vulners
Node
opencartopencartRange4.0.0.0
VendorProductVersionCPE
opencartopencart*cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

17.7%

Related for GHSA-7Q3H-J95Q-3VJH