exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AbanteCart Arbitrary File Upload / Cross Site Scripting

AbanteCart Arbitrary File Upload / Cross Site Scripting
Posted Dec 14, 2021
Authored by Ian Chong, Daniel Teo | Site sec-consult.com

AbanteCart e-commerce platform versions prior to 1.3.2 suffer from cross site scripting and file upload vulnerabilities.

tags | exploit, vulnerability, xss, file upload
advisories | CVE-2021-42050, CVE-2021-42051
SHA-256 | 1d18e94320294ca7bb9c057c9b6c90c647799d170ceda260890a08b559774f32

AbanteCart Arbitrary File Upload / Cross Site Scripting

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20211213-0 >
=======================================================================
title: Multiple vulnerabilities
product: AbanteCart e-commerce platform
vulnerable version: <1.3.2
fixed version: 1.3.2
CVE number: CVE-2021-42050, CVE-2021-42051
impact: Medium
homepage: https://www.abantecart.com
found: 2021-07-19
by: Daniel Teo (Office SG)
Ian Chong (Office SG)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult, an Atos company
Europe | Asia | North America

https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
"The meaning of the word 'abante' is to move forward or lead.
AbanteCart community stand behind exceptional work quality and dedication to
creating outstanding eCommerce software services. Our inspiration comes from
the developers that like developing with AbanteCart and constantly work to
expand and keep this project alive."

Source: https://www.abantecart.com


Business recommendation:
------------------------
SEC Consult recommends all companies who are using the AbanteCart software, to
upgrade to the latest version which is available at the vendor's official
website.

An in-depth security analysis performed by security professionals is highly
advised, as the software may be affected from further security issues.


Vulnerability overview/description:
-----------------------------------
1) Unrestricted File Upload (CVE-2021-42051)
Any low privileged user with file upload permissions can upload malicious SVG
files that contain a JavaScript payload.

By proceeding to the SVG file location, the payload will be executed on the
client-side.


2) DOM Based Cross-Site Scripting (CVE-2021-42050)
DOM Based XSS is an XSS attack wherein the attack payload is executed as a
result of modifying the DOM "environment" in the victim's browser used by the
original client-side script, so that the client-side code runs in an
"unexpected" manner.

The application was found to have a cross-site scripting vulnerability where
user supplied input is directly reflected in the Document Object Model, leading to
execution of arbitrary code. The vulnerable location is an input form which
allows users to perform search actions.


Proof of concept:
-----------------
1) Unrestricted File Upload (CVE-2021-42051)

A PoC SVG file can be created as follows:

* ************************************************************************** *
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN"
"http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">

<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);
stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
alert("sectest XSS");
</script>
</svg>
* ************************************************************************** *

2) DOM Based Cross-Site Scripting (CVE-2021-42050)

A payload was used in the search engine:

* ************************************************************************** *
<script>alert(document.domain)</script>
* ************************************************************************** *

Vulnerable / tested versions:
-----------------------------
The following product version has been tested which was the latest version available
during the time of the test:
* v1.3.0


Vendor contact timeline:
------------------------
2021-08-16: Contacting vendor through help@abantecart.com
2021-08-27: Vendor responded and indicated that the AbanteCart team have
scheduled a release on 25 September 2021 to address the issues.
2021-12-07: Multiple emails to check with the vendor on the release date.
However, no response from the AbanteCart team but noticed that
they had released the new version on 26 Nov 2021.
2021-12-13: Release of security advisory


Solution:
---------
Upgrade to the latest version available v1.3.2 at the vendor's download page:
https://www.abantecart.com/download


Workaround:
-----------
None


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab

SEC Consult, an Atos company
Europe | Asia | North America

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos company. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF Daniel Teo, Ian Chong / @2021


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close