## Title: osCommerce 4.13-60075 File-Upload-RCE ## Author: nu11secur1ty ## Date: 12/14/2023 ## Vendor: https://www.oscommerce.com/ ## Software: https://www.oscommerce.com/download-file ## Reference: https://portswigger.net/web-security/file-upload ## Description: The parameter "icon-pencil" in the upload-file dz-clickable function is vulnerable for File upload and Remote Code Execution then! The attacker easily can destroy this system if he is a kracker, grey hat, or some kind of stupid kid. More: {https://portswigger.net/web-security/file-upload}. In this scenario, I just uploaded a PHP exploit which created a second file directly on the server and then I executed it DIRECTLY on the server, by using just a browser. This can be executed with more methods but we can talk about it later. =) STATUS: CRITICAL Vulnerability [+]Exploit: ``` You are hacked

\n"; fwrite($myfile, $txt); $txt = "

This is not good for you

\nYou can visit our website for more information!

\n"; fwrite($myfile, $txt); fclose($myfile); ?> ``` ## Reproduce: [href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oscommerce.com/osCommerce-4.13-60075) ## Proof and Exploit: [href](https://www.nu11secur1ty.com/2023/12/oscommerce-413-60075-file-upload-rce.html) ## Time spent: 00:15:00