header-logo
Suggest Exploit
vendor:
TomatoCart
by:
indoushka
7.5
CVSS
HIGH
Backup
N/A
CWE
Product Name: TomatoCart
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009

TomatoCart Backup Vulnerability

An attacker can access the admin/backups directory of the TomatoCart application and view the credentials of the administrator in line 42.

Mitigation:

Restrict access to the admin/backups directory and ensure that the credentials are not stored in plaintext.
Source

Exploit-DB raw data:

========================================================================================
| # Title    : TomatoCart Backup Vulnerability                                         |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # EDB-ID   : 10683                                                                   |
| # CVE-ID   : ()                                                                      |
| # OSVDB-ID : ()                                                                      |
| # DAte     :16/12/2009                                                               |
| # Verified :                                                                         |
| # Web Site : www.iq-ty.com                                                           |
| # Published:                                                                         |
| # Script   : Powered by TomatoCart (Copyright (c) 2009 Wuxi Elootec Technology Co., Ltd;  Copyright (c) 2005 osCommerce)
| # Tested on: windows SP2 Fran�ais V.(Pnx2 2.0) + Lunix Fran�ais v.(9.4 Ubuntu)       |
| # Bug      : Backup                                                                  |
======================      Exploit By indoushka       =================================
| # Exploit  :
|
| 1- http://127.0.0.1/tomatocart/admin/backups/
|
| 2- look in lin 42 u find the user and pass
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------