ID PACKETSTORM:119082 Type packetstorm Reporter Aung Khant Modified 2012-12-24T00:00:00
Description
`1. OVERVIEW
CubeCart 4.4.6 and lower versions are vulnerable to Local File Inclusion.
2. BACKGROUND
CubeCart is an "out of the box" ecommerce shopping cart software
solution which has been written to run on servers that have PHP &
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.
3. VULNERABILITY DESCRIPTION
CubeCart 4.4.6 and lower versions contain a flaw that may allow a
remote attacker to execute arbitrary commands or code. The issue is
due to the '/admin.php' script not properly sanitizing user input,
specifically directory traversal style attacks (e.g., ../../) supplied
to the 'loc' parameter. This may allow an attacker to include a file
from the targeted host that contains arbitrary commands or code that
will be executed by the vulnerable script. Such attacks are limited
due to the script only calling files already on the target host. In
addition, this flaw can potentially be used to disclose the contents
of any file on the system accessible by the web server.
4. VERSIONS AFFECTED
4.4.6 and lower
5. Affected URL and Parameter
/admin.php (loc parameter)
/admin.php?_g=filemanager/language&loc=/../../../public_ftp/uploads/hack.inc.php
6. SOLUTION
The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_lfi
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/
#yehg [2012-12-24]
---------------------------------
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
`
{"id": "PACKETSTORM:119082", "type": "packetstorm", "bulletinFamily": "exploit", "title": "CubeCart 4.4.6 Local File Inclusion", "description": "", "published": "2012-12-24T00:00:00", "modified": "2012-12-24T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/119082/CubeCart-4.4.6-Local-File-Inclusion.html", "reporter": "Aung Khant", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:27:27", "viewCount": 4, "enchantments": {"score": {"value": -0.5, "vector": "NONE", "modified": "2016-11-03T10:27:27", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:27:27", "rev": 2}, "vulnersScore": -0.5}, "sourceHref": "https://packetstormsecurity.com/files/download/119082/cubecart446-lfi.txt", "sourceData": "`1. OVERVIEW \n \nCubeCart 4.4.6 and lower versions are vulnerable to Local File Inclusion. \n \n \n2. BACKGROUND \n \nCubeCart is an \"out of the box\" ecommerce shopping cart software \nsolution which has been written to run on servers that have PHP & \nMySQL support. With CubeCart you can quickly setup a powerful online \nstore which can be used to sell digital or tangible products to new \nand existing customers all over the world. \n \n \n3. VULNERABILITY DESCRIPTION \n \nCubeCart 4.4.6 and lower versions contain a flaw that may allow a \nremote attacker to execute arbitrary commands or code. The issue is \ndue to the '/admin.php' script not properly sanitizing user input, \nspecifically directory traversal style attacks (e.g., ../../) supplied \nto the 'loc' parameter. This may allow an attacker to include a file \nfrom the targeted host that contains arbitrary commands or code that \nwill be executed by the vulnerable script. Such attacks are limited \ndue to the script only calling files already on the target host. In \naddition, this flaw can potentially be used to disclose the contents \nof any file on the system accessible by the web server. \n \n \n4. VERSIONS AFFECTED \n \n4.4.6 and lower \n \n \n5. Affected URL and Parameter \n \n/admin.php (loc parameter) \n/admin.php?_g=filemanager/language&loc=/../../../public_ftp/uploads/hack.inc.php \n \n \n6. SOLUTION \n \nThe CubeCart 4.x version family is no longer maintained by the vendor. \nUpgrade to the currently supported latest CubeCart version - 5.x. \n \n \n7. VENDOR \n \nCubeCart Development Team \nhttp://cubecart.com/ \n \n \n8. CREDIT \n \nAung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar. \n \n \n9. DISCLOSURE TIME-LINE \n \n2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle \n2012-12-24: Vulnerability disclosed \n \n \n10. REFERENCES \n \nOriginal Advisory URL: \nhttp://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_lfi \nCubeCart Home Page: http://cubecart.com/ \nCubeCart Bug-Fix Announcement: \nhttp://forums.cubecart.com/topic/45456-cubecart-447-released/ \nCubeCart4 End-of-Life Announcement: \nhttp://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/ \n \n#yehg [2012-12-24] \n--------------------------------- \nBest regards, \nYGN Ethical Hacker Group \nYangon, Myanmar \nhttp://yehg.net \nOur Lab | http://yehg.net/lab \nOur Directory | http://yehg.net/hwd \n`\n", "immutableFields": []}