Zen Cart 1.3.8a, 1.3.8, and earlier does not require administrative authentication for admin/record_company.php, which allows remote attackers to execute arbitrary code by uploading a .php file via the record_company_image parameter in conjunction with a PATH_INFO of password_forgotten.php, then accessing this file via a direct request to the file in images/.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/35467 | exploit vdb entry patch |
http://www.osvdb.org/55344 | vdb entry |
http://www.zen-cart.com/forum/showthread.php?t=130161 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51316 | vdb entry |
http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 | patch |
http://www.exploit-db.com/exploits/9004 | exploit |
http://secunia.com/advisories/35550 | third party advisory vendor advisory |