Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Commerce)  >   DCShop Vendors:   DCScripts
DCShop Shopping Cart Lets Remote Users Delete the Database Setup File Using a Null-byte Attack
SecurityTracker Alert ID:  1003889
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 25 2002
Impact:   Denial of service via network
Exploit Included:  Yes  

Description:   A vulnerability was reported in DCScript's DCShop e-commerce shopping cart software. A remote user can delete setup files on the system.

It is reported that a remote user can delete a 'database.setup' file on the system using a NULL byte terminated filename variable within a multipart form data submission.

For example, using curl (, the following command can be used to trigger the flaw:

curl -F database=@test.txt http://host/cgi-bin/dcshop.cgi

In this example, the 'test.txt' file contains 'databasename.setup[nullbyte]'.

Impact:   A remote user can delete the 'database.setup' file on the system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (NT), Windows (2000)
Underlying OS Comments:  Perl-based

Message History:   None.

 Source Message Contents

Subject:  dcshop.cgi anybody can delete *.setup for database

cgi-pl in dcshop beta  ( 
allow user to using nullbyte character for variable if 
using multipart/form data type form.
Using curl ( :

curl -F database=@test.txt http://host/cgi-

which test.txt contain databasename.setup[nullbyte]
will couse database.setup file being deleted


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC