Lucene search

K
packetstormCraCkErPACKETSTORM:178770
HistoryMay 23, 2024 - 12:00 a.m.

FleetCart 4.1.1 Information Disclosure

2024-05-2300:00:00
CraCkEr
packetstormsecurity.com
146
exploit
information disclosure
envaysoft
cwe-200
cwe-284
cwe-266
cve-2024-5230
capec-19
att&ck t1592
razorpay
administration panel

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.5%

`# Exploit Title: FleetCart 4.1.1 - WebPage Content Information Disclosure  
# Exploit Author: CraCkEr  
# Date: 13/05/2024  
# Vendor: EnvaySoft  
# Vendor Homepage: https://codecanyon.net/item/fleetcart-laravel-ecommerce-system/23014826  
# Software Demo Link: https://demo.fleetcart.envaysoft.com/en  
# Tested on: Windows 11 Pro 22H2  
# Impact: Sensitive Information Leakage  
# CWE: CWE-200 - CWE-284 - CWE-266  
# CVE: CVE-2024-5230  
# CAPEC: CAPEC-19 / CAPEC-116  
# ATT&CK: T1592  
  
  
## Description  
  
Issues with information disclosure in redirect responses. Accessing the majority of the website's pages exposes sensitive data, including the "Razorpay" "razorpayKeyId".  
  
  
## Steps to Reproduce:  
  
When you view the majority of the pages on the website, such as  
  
https://demo.fleetcart.envaysoft.com/en/login  
https://demo.fleetcart.envaysoft.com/en/categories/smartphones/products  
https://demo.fleetcart.envaysoft.com/en/products?query=123  
  
  
There is information leaking in the body page response.  
  
+---------------------+  
razorpayKeyId: 'rzp_test_oACp03vDsqdixc',  
+---------------------+  
  
  
Note: the same leaked "razorpayKeyId" is added to "Razorpay" in the Administration Panel.  
  
on this Path:  
  
https://demo.fleetcart.envaysoft.com/en/admin/settings?tab=razorpay (Login as Administrator)  
  
  
  
[-] Done  
`

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.5%

Related for PACKETSTORM:178770