SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Commerce)  >   DCShop Vendors:   DCScripts
DCShop Shopping Cart Lets Remote Users Delete the Database Setup File Using a Null-byte Attack
SecurityTracker Alert ID:  1003889
SecurityTracker URL:  http://securitytracker.com/id/1003889
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 25 2002
Impact:   Denial of service via network
Exploit Included:  Yes  

Description:   A vulnerability was reported in DCScript's DCShop e-commerce shopping cart software. A remote user can delete setup files on the system.

It is reported that a remote user can delete a 'database.setup' file on the system using a NULL byte terminated filename variable within a multipart form data submission.

For example, using curl (http://curl.haxx.se/libcurl/), the following command can be used to trigger the flaw:

curl -F database=@test.txt http://host/cgi-bin/dcshop.cgi

In this example, the 'test.txt' file contains 'databasename.setup[nullbyte]'.

Impact:   A remote user can delete the 'database.setup' file on the system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.dcscripts.com/dcshop.shtml (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (NT), Windows (2000)
Underlying OS Comments:  Perl-based

Message History:   None.


 Source Message Contents

Subject:  dcshop.cgi anybody can delete *.setup for database




cgi-pl in dcshop beta  (http://www.dcscripts.com) 
allow user to using nullbyte character for variable if 
using multipart/form data type form.
Using curl (http://curl.haxx.se/libcurl/) :

curl -F database=@test.txt http://host/cgi-
bin/dcshop.cgi

which test.txt contain databasename.setup[nullbyte]
will couse database.setup file being deleted

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC