osCommerce 3.0a5 - Local File Inclusion / HTML Injection
Author: Jordi Chancel
type: webapps
platform: php
port:
date_added: 2010-04-30
date_updated: 2014-06-29
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/39820/info
osCommerce is prone to a local file-include vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to execute local files within the context of the webserver process.
The attacker may leverage the HTML-injection issue to execute arbitrary HTML and script code in the context of the affected browser. This may let the attacker steal cookie-based authentication credentials or control how the site is rendered to the user.
osCommerce 3.0a5 is affected; other versions may also be vulnerable.
http://www.example.com/admin/includes/applications/services/pages/uninstall.php?module=../../../../../../../../cmd