Description
The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code'].
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5664 | The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code']. |
Github GHSA |
GHSA-wx3q-f5f2-4q8v | OpenCart Path Traversal |
References
| Link | Providers |
|---|---|
| http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:10:14.582Z
Reserved: 2018-05-26T00:00:00.000Z
Link: CVE-2018-11494
No data.
Status : Modified
Published: 2018-05-26T20:29:00.217
Modified: 2024-11-21T03:43:29.020
Link: CVE-2018-11494
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA