Lucene search

K
packetstormEagle EyePACKETSTORM:179073
HistoryJun 13, 2024 - 12:00 a.m.

Quick Cart 6.7 Shell Upload

2024-06-1300:00:00
Eagle Eye
packetstormsecurity.com
71
quick cart
remote code execution
shell upload
vendor
eagle eye
windows
linux
unfiltered parameter
file inclusion
file extension override
authentication bypass

AI Score

7.4

Confidence

Low

`# Title : Authenticated Remote Code Execution & Shell Upload  
# Product : Quick Cart  
# Vendor : https://opensolution.org/  
# Affected Version : 6.7  
# Researcher : Eagle Eye  
# Tested on : Window & Linux  
# Date : 11/06/2024  
# Affected path : admin.php , core/common-admin.php, database/config.php  
# Affected function : saveVariables()  
# Report : Already contact the vendor but no response  
  
# Description : Unfiltered parameter that post into admin.php?p=tools-config override any  
$config key value cause to unwanted file inclusion and allowed file extension overriding  
lead to remote code execution.  
# Step to reproduce (Method 1)  
- login at admin.php  
- click Products and New Product from top navbar  
- On the right panel, choose add file  
- Upload malicious script with extension txt or any allowed extension like jpg  
- click setting on right above  
- click save and intercept the request  
- on body parameter, add &default_pages_template=../../files/yourmaliciousfile.txt and proceed  
# Step to reproduce (Method 2)  
- login at admin.php  
- click setting on right above  
- click save and intercept the request  
- on body parameter, add &allowed_extensions=php and proceed  
- click Products and New Product from top navbar  
- On the right panel, choose add file  
- And you can upload malicious script with extension php - You may find on path eg: http://website.com/files/shell.php  
`

AI Score

7.4

Confidence

Low