Qualiteam X-Cart 3.x general.php perl_binary Parameter Arbitrary Command Execution

2014-07-01T00:00:00
ID SSV:77388
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                source: http://www.securityfocus.com/bid/9560/info

X-Cart has been reported to be prone to an issue that may allow remote attackers to execute arbitrary commands on the affected system. The issue is caused by a failure of the application to sanitize values specified by parameters in the URI. 

http://server/admin/general.php?mode=perlinfo&config[General][perl_binary]=/bin/ls -lR ||