header-logo
Suggest Exploit
vendor:
Shopping Cart
by:
Mr.aFiR
N/A
CVSS
N/A
Full Path Disclosure
N/A
CWE
Product Name: Shopping Cart
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: GNU/LINUX
2009

Interspire Shopping Cart Full Path Disclosure

This is Shopping Cart script, sometimes we find us on a server where we have a shopping cart script as this. And we dont know the directory of infected website (ISC) and we cant find it by using our uploaded shell. This Vulnerability is comming to show you the directory of website(with username on system somes times).

Mitigation:

N/A
Source

Exploit-DB raw data:

# Exploit Title: Interspire Shopping Cart Full Path Disclosure
# Date: 13-12-2009
# Author: Mr.aFiR
# Software Link: http://www.interspire.com/
# Version: N/A
# Tested on: GNU/LINUX
# CVE : N/A
# Code : N/A
#####################################################################

#####################################################################
##                                _______   ____                   ##
##          __ ___               / _____ \ /  __ \                 ##
##         /      \  _ _     ___ | |___ |/ | |  ) )                ##
##        |  Y  Y  \| V_\   / _ Y|  __ |(_)| |_/ /      [A]        ##
##        |__|__|__ \ |  ()| (_] | |  \|| ||  __ \                 ##
##                 \/_/     \___ | |    | || |  ) |                ##
##                              \|/     |_/|_/  |/                 ##
##                                                                 ##
#####################################################################
##          Interspire Shopping Cart Full Path Disclosure          ##
##                     [Full Path Disclosure]                      ##
##              Created By Mr.aFiR (Moroccan Hacker)               ##
##                    Email: q-_@hotmail.com                       ##
##                     Website: www.aFiR.me                        ##
##                      (c) -- 13/12/2oo9                          ##
#####################################################################
##                        * What's it ?                            ##
##                      -----------------                          ##
## ~  This is Shopping Cart script, sometimes we find us on a      ##
##    server where we have a shopping cart script as this.         ##
##    And we dont know the directory of infected website (ISC)     ##
##    and we cant find it by using our uploaded shell.             ##
##    This Vulnerability is comming to show you the directory      ##
##    of website(with username on system sometimes).               ##
## ~ Infected File : [xml.php]                                     ##
##   // Get the XML request data                                   ##
##	if(isset($_REQUEST["xml"])) {                              ##
##		$request = $_REQUEST["xml"];                       ##
##	}                                                          ##
##	else {                                                     ##
##		$request = file_get_contents('php://input');       ##
##	}                                                          ##
##                                                                 ##
##	// Instantiate the API which also takes care of validation ##
##	$api = new API($request);                                  ##
##                                                                 ##
##	// Run the request                                         ##
##	$api->RunRequest();                                        ##
##                                                                 ##
## ~ When we're visiting "xml.php" without the request "?xml=*"    ##
##   the request is gonna be good with out any error.              ##
##   But if we sent a request with the "?xml=*" ,                  ##
##   that will make an PHP error. Error location :                 ##
##   [includes/classes/class.api.php] on line 91:                  ##
##      // Store a refernece to the XML object                     ##
##       $this->_xml = new SimpleXMLElement($this->_request);      ##
## ~ This is Only a Full Path Diclosure Vunlerability !            ##
##  ------------------------------------------------------------   ##
##      Thanks & Greatz To≤ All My Friends (Dr.Crypter, Love511,   ##
##       Dr.BoB-Hacker, Mr.LASSiSSi, ...) & All Muslim HaCkerz.    ##
#####################################################################
## ~ GreatZ To : > Dr.Crypter - Dr.BoB-Hacker - Love511 & All ...  ##
## ~ Contact   : > q-_[at]Hotmail[dot]com - www[dot]aFiR[dot]me    ##
##                        I Love You ****                          ##
#####################################################################

© aFiR.Me - 0nly F0r Security 2009 | By Mr.aFiR