首页
学习
活动
专区
工具
TVP
发布
精选内容/技术社群/优惠产品,尽在小程序
立即前往

原创漏洞 Opencart v3.x

团队的小伙伴BigD(ZhongHao)近期对Opencart_v3.x(世界著名的开源电子商务系统)进行了代码审计和漏洞挖掘,并从网站后台模块中发现了“任意文件下载”以及“任意代码执行”这两个漏洞,目前这两个漏洞已经成功申请了CVE,漏洞详情页如下:

CVE-2018-11494,

https://nvd.nist.gov/vuln/detail/CVE-2018-11494

CVE-2018-11495,

https://nvd.nist.gov/vuln/detail/CVE-2018-11495Reporter

Name: zhonghao, f0@gnusec

Time: 2018.5.21

Description

The program can be set in the background to download the user file, the user can download the file in the user center (to meet certain conditions, usually after the completion of the order). During this entire process, the administrator can define the address of the downloaded file in the background, and does not make reasonable judgments and filtering on the download address entered by the administrator, resulting in the download of arbitrary files on the server across directories.

The background has an installable and extensible function that allows the user to upload and install scalable function code. Due to problems in the processing logic, combined with other bugs in the system’s other business functions, it can cause arbitrary code execution.

Repair proposal

Filter user input across directory strings.

The specific operation steps for installing the extension should be initiated by the server itself and not processed by the client.

欢迎关注我们!一起交流信息安全技术!

  • 发表于:
  • 原文链接https://kuaibao.qq.com/s/20180528G0CA3M00?refer=cp_1026
  • 腾讯「腾讯云开发者社区」是腾讯内容开放平台帐号(企鹅号)传播渠道之一,根据《腾讯内容开放平台服务协议》转载发布内容。
  • 如有侵权,请联系 cloudcommunity@tencent.com 删除。

扫码

添加站长 进交流群

领取专属 10元无门槛券

私享最新 技术干货

扫码加入开发者社群
领券