Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txt | third party advisory exploit |
http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html |