header-logo
Suggest Exploit
vendor:
X-Cart
by:
SecurityFocus
9.3
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: X-Cart
Affected Version From: X-Cart 2.0.0
Affected Version To: X-Cart 2.0.3
Patch Exists: YES
Related CWE: CVE-2002-1390
CPE: a:x-cart:x-cart
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2002

X-Cart Remote Command Execution

X-Cart is vulnerable to a Remote Command Execution vulnerability due to a failure to sanitize values specified by parameters in the URI. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, containing a maliciously crafted parameter in the URI. This will allow the attacker to execute arbitrary commands on the affected system.

Mitigation:

Users should ensure that all applications are kept up to date with the latest security patches.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/9560/info

X-Cart has been reported to be prone to an issue that may allow remote attackers to execute arbitrary commands on the affected system. The issue is caused by a failure of the application to sanitize values specified by parameters in the URI. 

http://server/admin/general.php?mode=perlinfo&config[General][perl_binary]=/bin/ls -lR ||