CommerceSQL shopping cart allows remote file reading via a directory traversal vulnerability in its index.cgi.
6f4df4b2df394eb3256053752a246944664140cbf21550acf95750c5516627ce
CommerceSQL shopping cart (https://commercesql.com) allows remote file reading. It only needs to specially prepared page variable in index.cgi to allow reading remote files (like /etc/passwd)
By using prepared GET page variable it allows user to read remote files
Example:
With index.cgi?page=../../../../../../../../etc/passwd puts out your /etc/passwd on the screen of pottential attacker.
Vulnerable:
* All CommerceSQL Shopping Cart Versions
Exploits:
* Not needed
Patch:
* Not yet available
--
Mariusz "Craig" Cieśla <craig@tenbit.pl>
getNet network administrator / security consultant