PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2015/Nov/67 | mailing list exploit third party advisory |
https://www.exploit-db.com/exploits/38728/ | exploit vdb entry third party advisory |
https://blog.curesec.com/article/blog/AlegroCart-128-LFIRFI-102.html | third party advisory exploit |
http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html | exploit vdb entry third party advisory |