Remote Code Execution Exploit

www.winkelstop.nl

No avatar

2007-08-27 21:21

http://www.milw0rm.com/exploits/4025

Shows an quick cart exploit for version 2.2 and lower. Anybody having access to cart/admin can do this. Often users keep using admin, admin to login. Yes its stupid but people do stupid thing so this exploid excists...

Best is to allow jpg, gif and png to be uploaded and block other extensions.
At this moment the files " libraries\FotoJobs.php" and " libraries\FileJobs.php" allow everything and need to be patched for more security...

Any programmers here with security in mind?

» Quick.Cart v2.x

treewood (OpenSolution)

Avatar: treewood

2007-08-28 09:20

www.winkelstop.nl - if You dont want to have possibility to upload php/exe/bat etc. files then:
1. Edit core/files-admin.php and find function addFiles()
2. Change:

if( !empty( $_FILES['aFiles']['name'][$i] ) ){

to:

if( !empty( $_FILES['aFiles']['name'][$i] ) && $oFoto->checkCorrectFile$_FILES['aFiles']['name'][$i], 'php|exe|com|pph|php3|php4|php5|cgi|pl|bat|pif' ) != true ){

merci

No avatar

2007-08-28 09:21

www.winkelstop.nl - how to fix that was written here: http://opensolution.org/Quick.Cart/forum/?p=readTopic&nr=4334
Already it is fixed.

Back to top
about us | contact