Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Commerce)  >   osCommerce Vendors:   osCommerce
osCommerce 'extras' Directory Bug May Let Remote Users View Files on the Target System
SecurityTracker Alert ID:  1015944
SecurityTracker URL:
CVE Reference:   CVE-2005-2330   (Links to External Site)
Updated:  Nov 27 2009
Original Entry Date:  Apr 15 2006
Impact:   Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 2.2 and prior versions
Description:   rgod reported a vulnerability in osCommerce. A remote user may be able to view files on the target system.

If the 'extras' directory is installed on the target system under the web root directory, a remote user can invoke 'extras/update.php' with a specially crafted 'readme_file' parameter value to view files on the target system. A relative path (including directory traversal characters) or an absolute path name can be used.

Some demonstration exploit URLs are provided:



The original advisory is available at:

Impact:   A remote user can view files on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  osCommerce "extras/" information/source code disclosure

---- osCommerce <= 2.2 "extras/" information/source code disclosure ------------

software site:

if extras/ folder is placed inside the www path, you can see all files on target
system, including php source code with database details, poc:


this is the vulnerable code in update.php:

	include '../mysql.php';
	// if a readme.txt file exists, display it to the user
	if(!$read_me) {
		if(file_exists('readme.txt')) {
			$readme_file = 'readme.txt';
		elseif(file_exists('README')) {
			$readme_file = 'README';
		elseif(file_exists('readme')) {
			$readme_file = 'readme';
		if($readme_file) {
			$readme = file($readme_file);
			print "<CENTER><TABLE BORDER=\"1\" WIDTH=\"75%\" CELLPADDING=\"2\" CELLSPACING=\"0\"><TR BGCOLOR=\"#e7e7cc\"><TD>\n";
			print nl2br(htmlentities(implode($readme, ' ')));
			print "<HR NOSHADE SIZE=\"1\"><CENTER><A HREF=\"update.php?read_me=1\"><B>Continue</B></A></CENTER>\n";
			print "</TD></TR></TABLE>\n";

google search:

inurl:"extras/update.php" intext:mysql.php -display


mail: rgod at
original advisory:


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC