PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2015/Nov/67 | Exploit Mailing List Third Party Advisory |
https://blog.curesec.com/article/blog/AlegroCart-128-LFIRFI-102.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/38728/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2017-09-11 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-9227
Mitre link : CVE-2015-9227
CVE.ORG link : CVE-2015-9227
JSON object : View
Products Affected
alegrocart
- alegrocart
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')