CVE-2018-11494

The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code'].
References
Link Resource
http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ Exploit Third Party Advisory
http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:43

Type Values Removed Values Added
References () http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ - Exploit, Third Party Advisory () http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ - Exploit, Third Party Advisory

Information

Published : 2018-05-26 20:29

Updated : 2024-11-21 03:43


NVD link : CVE-2018-11494

Mitre link : CVE-2018-11494

CVE.ORG link : CVE-2018-11494


JSON object : View

Products Affected

opencart

  • opencart
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-434

Unrestricted Upload of File with Dangerous Type