Open Hexife opened 6 years ago
I also got the CVE for 3,4,5 vulnerability - CVE-2018-18966 ( eml ), CVE-2018-18964 ( svg ), CVE-2018-18965 (strange file extension / no extension).
Hi @Hexife ! Is this issue was already fixed in further versions ? Thanks :)
Hello!
I tested it again in 2.4.2 version, and confirmed that the vulnerabilities are not patched yet.
Brief of this vulnerability osCommerce use
.htaccess
file for preventing to execute php and html files. But it is not complete set to preventing all of malicious files. As the result, Adversary can upload several types of malicious file.This vulnerability needs the admin credentials, but this vulnerability can be used to compromise web server that osCommerce installed.
Test Environment
Tested version 2.3.4.1 (Downloaded from Official Site)
Payload & Reason of vulnerability
.htaccess
file located inhttp://[ host ip ] /oscommerce2/catalog/images/
directory. It prevents to execution of several dangerous extensions. But its regular expression do not preventpht
extensions. As a result, php script with pht extension can be uploaded and executed.ps. If osCommerce runs on PHP 7.1+ environment,
phar
extension also can be executed in the server.This vulnerability reserved to CVE-2018-18572.
.htaccess
file. So, adversary can change the.htaccess
file. If.htaccess
file changed, all of the PHP-supported file can be executed. Even file that has arbitrary extension and PHP script can be executed.This vulnerability reserved to CVE-2018-18573.
.htaccess
file inhttp://[ host ip ] /oscommerce2/catalog/images/
directory bannedhtml
extension, but there are several extensions that HTML can be executed. One of the extension string issvg
. If adversary assemble SVG file and HTML file to SVG file, that assembed SVG file can be execute HTML in client browser..htaccess
file inhttp://[ host ip ] /oscommerce2/catalog/images/
directory bannedhtml
extension, but there are several extensions that HTML can be executed.eml
extention is not executed in other browsers, but only Internet Explorer render HTML elements ineml
file..htaccess
file inhttp://[ host ip ] /oscommerce2/catalog/images/
directory bannedhtml
extension, but there are several extensions that HTML can be executed. The file that has no extension or strange extension can be rendered in web browsers.Vulnerability 1 and 2 are about PHP Code execution via arbitrary file upload, and others are about HTML Execution (related with XSS).
These vulnerabilities needs administrator credentials, but I still think it is vulnerable.
I did not upload test payloads due to abusing problems.
If you needs to fix these vulnerability, please announce me your mail.
Thank you.