Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/46912 - | |
References | () http://secunia.com/advisories/31039 - Vendor Advisory | |
References | () http://www.attrition.org/pipermail/vim/2008-July/002028.html - Exploit | |
References | () http://www.securityfocus.com/bid/30179 - Exploit | |
References | () http://www.zen-cart.com/forum/showthread.php?t=102802 - Exploit | |
References | () https://www.exploit-db.com/exploits/6038 - |
07 Nov 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
Summary | Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths. |
Information
Published : 2009-07-27 14:30
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6877
Mitre link : CVE-2008-6877
CVE.ORG link : CVE-2008-6877
JSON object : View
Products Affected
zen_cart
- zen_cart
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')