Directory traversal vulnerability in admin/includes/languages/english.php in Zen Cart 1.3.8a, 1.3.8, and earlier, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the _SESSION[language] parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/31039 | third party advisory vendor advisory |
http://www.attrition.org/pipermail/vim/2008-July/002028.html | mailing list exploit |
http://www.zen-cart.com/forum/showthread.php?t=102802 | exploit |
https://www.exploit-db.com/exploits/6038 | exploit |
http://www.securityfocus.com/bid/30179 | vdb entry exploit |
http://osvdb.org/46913 | vdb entry |