TomatoCart 'json.php' Local File Include Vulnerability
BID:52766
Info
TomatoCart 'json.php' Local File Include Vulnerability
| Bugtraq ID: | 52766 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-5907 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 28 2012 12:00AM |
| Updated: | Jan 11 2013 01:00PM |
| Credit: | Canberk Bolat |
| Vulnerable: |
TomatoCart TomatoCart 1.2.0 Alpha 2 |
| Not Vulnerable: | |
Discussion
TomatoCart 'json.php' Local File Include Vulnerability
TomatoCart is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
TomatoCart 1.2.0 Alpha 2 is vulnerable; other versions may also be affected.
TomatoCart is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
TomatoCart 1.2.0 Alpha 2 is vulnerable; other versions may also be affected.
Exploit / POC
TomatoCart 'json.php' Local File Include Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/json.php?action=3&module=../../../../../../../../../../../../../../boot.ini%00
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/json.php?action=3&module=../../../../../../../../../../../../../../boot.ini%00
Solution / Fix
TomatoCart 'json.php' Local File Include Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
TomatoCart 'json.php' Local File Include Vulnerability
References:
References:
- Local File Inclusion Vulnerability in TomatoCart (Canberk Bolat )
- Vendor Homepage (TomatoCart)