vendor:
osCommerce
by:
Simon Scannell
7.5
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: osCommerce
Affected Version From: 2.3.4.1
Affected Version To: 2.3.4
Patch Exists: NO
Related CWE: N/A
CPE: oscommerce
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux, Windows
2018
osCommerce 2.3.4.1 Remote Code Execution
If an Admin has not removed the /install/ directory as advised from an osCommerce installation, it is possible for an unauthenticated attacker to reinstall the page. The installation of osCommerce does not check if the page is already installed and does not attempt to do any authentication. It is possible for an attacker to directly execute the "install_4.php" script, which will create the config file for the installation. It is possible to inject PHP code into the config file and then simply executing the code by opening it.
Mitigation:
Remove the /install/ directory from the osCommerce installation.