header-logo
Suggest Exploit
vendor:
osCommerce
by:
7.5
CVSS
HIGH
Local File Include and HTML Injection
CWE
Product Name: osCommerce
Affected Version From: osCommerce 3.0a5
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Local File Include and HTML Injection Vulnerabilities in osCommerce

osCommerce is prone to a local file-include vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit the local file-include vulnerability using directory-traversal strings to execute local files within the context of the webserver process. The attacker may leverage the HTML-injection issue to execute arbitrary HTML and script code in the context of the affected browser. This may let the attacker steal cookie-based authentication credentials or control how the site is rendered to the user.

Mitigation:

It is recommended to sanitize user-supplied input to prevent local file-include and HTML-injection vulnerabilities. Additionally, keeping the osCommerce installation up to date with the latest security patches can help mitigate these vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39820/info

osCommerce is prone to a local file-include vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit the local file-include vulnerability using directory-traversal strings to execute local files within the context of the webserver process.

The attacker may leverage the HTML-injection issue to execute arbitrary HTML and script code in the context of the affected browser. This may let the attacker steal cookie-based authentication credentials or control how the site is rendered to the user.

osCommerce 3.0a5 is affected; other versions may also be vulnerable. 

http://www.example.com/admin/includes/applications/services/pages/uninstall.php?module=../../../../../../../../cmd