The Cart::getProducts method in system/library/cart.php in OpenCart 1.5.6.4 and earlier allows remote attackers to conduct server-side request forgery (SSRF) attacks or possibly conduct XML External Entity (XXE) attacks and execute arbitrary code via a crafted serialized PHP object, related to the quantity parameter in an update request.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/532763/100/0/threaded | mailing list third party advisory vdb entry exploit |
https://github.com/opencart-ce/opencart-ce/commit/c2aafc823bd85876f5e888f8ebc421069a5e076f | patch third party advisory issue tracking |
http://seclists.org/fulldisclosure/2014/Jul/67 | mailing list third party advisory exploit |
http://karmainsecurity.com/KIS-2014-08 | third party advisory exploit |
http://packetstormsecurity.com/files/127460/OpenCart-1.5.6.4-PHP-Object-Injection.html | third party advisory vdb entry exploit |
http://www.securityfocus.com/bid/68529 | third party advisory vdb entry |