osCommerce update.php readme_file Parameter Arbitrary File Disclosure

medium Nessus Plugin ID 19256

Synopsis

The remote web server contains a PHP script that is affected by an information disclosure vulnerability.

Description

The osCommerce installation on the remote host has a supplementary script, 'extras/update.php', that fails to validate user-supplied input to the 'readme_file' parameter before using that to display a file. An attacker can exploit this flaw to read arbitrary files on the remote host, such as the '.htaccess' file used to protect the admin directory.

Solution

Remove the 'extras/update.php' script.

See Also

http://www.oscommerce.com/community/bugs,2835

Plugin Details

Severity: Medium

ID: 19256

File Name: oscommerce_readme_file_disclosure.nasl

Version: 1.24

Type: remote

Family: CGI abuses

Published: 7/21/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:oscommerce:oscommerce

Required KB Items: www/oscommerce

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 7/18/2005

Reference Information

CVE: CVE-2005-2330

BID: 14294