CVE-2018-18572
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. Because of this filter, script files with certain PHP-related extensions (such as .phtml and .php5) didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administrators can upload '.pht' files for arbitrary PHP code execution via a /catalog/admin/categories.php?cPath=&action=new_product URI.
osCommerce 2.3.4.1 tiene un '.htaccess' incompleto para el filtrado de listas negras en la página "producto". Debido a este filtro, los archivos de script con ciertas extensiones relacionadas con PHP (como .phtml y .php5) no se ejecutaron en la aplicación. Pero este filtro no impidió la extensión '.pht'. Por lo tanto, los administradores autenticados remotos pueden cargar archivos '.pht' para la ejecución arbitraria de código PHP a través de n /catalog/admin/categories.php?cPath=&action=new_product URI.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-10-22 CVE Reserved
- 2019-08-22 CVE Published
- 2023-06-11 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/osCommerce/oscommerce2/issues/631 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oscommerce Search vendor "Oscommerce" | Oscommerce Search vendor "Oscommerce" for product "Oscommerce" | 2.3.4.1 Search vendor "Oscommerce" for product "Oscommerce" and version "2.3.4.1" | - |
Affected
|