osCommerce Local File Include and HTML Injection Vulnerabilities
BID:39820
Info
osCommerce Local File Include and HTML Injection Vulnerabilities
| Bugtraq ID: | 39820 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 30 2010 12:00AM |
| Updated: | Apr 30 2010 12:00AM |
| Credit: | Alberto Fontanella |
| Vulnerable: |
osCommerce osCommerce 3.0a5 |
| Not Vulnerable: | |
Discussion
osCommerce Local File Include and HTML Injection Vulnerabilities
osCommerce is prone to a local file-include vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to execute local files within the context of the webserver process.
The attacker may leverage the HTML-injection issue to execute arbitrary HTML and script code in the context of the affected browser. This may let the attacker steal cookie-based authentication credentials or control how the site is rendered to the user.
osCommerce 3.0a5 is affected; other versions may also be vulnerable.
osCommerce is prone to a local file-include vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to execute local files within the context of the webserver process.
The attacker may leverage the HTML-injection issue to execute arbitrary HTML and script code in the context of the affected browser. This may let the attacker steal cookie-based authentication credentials or control how the site is rendered to the user.
osCommerce 3.0a5 is affected; other versions may also be vulnerable.
Exploit / POC
osCommerce Local File Include and HTML Injection Vulnerabilities
Attackers can exploit these issues with a browser.
The following example URI is available:
http://www.example.com/admin/includes/applications/services/pages/uninstall.php?module=../../../../../../../../cmd
Attackers can exploit these issues with a browser.
The following example URI is available:
http://www.example.com/admin/includes/applications/services/pages/uninstall.php?module=../../../../../../../../cmd
Solution / Fix
osCommerce Local File Include and HTML Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
References
osCommerce Local File Include and HTML Injection Vulnerabilities
References:
References:
- osCommerce Homepage (osCommerce)
- Multiple Vulnerabilities in osCommerce (osCommerce)