exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

cart32-download.txt

cart32-download.txt
Posted Oct 5, 2007
Authored by Paul Craig | Site security-assessment.com

Cart32 versions 6.3 and below suffer from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | a92fa9402089256f28b31d6407f2dce1d7e435f93e1b897eed66b1ed6d626af2

cart32-download.txt

Change Mirror Download
========================================================================
= Cart32 Arbitrary File Download Vulnerability
=
= Vendor Website:
= http://www.cart32.com
=
= Affected Version:
= -- All releases prior to and including v6.3
=
= Public disclosure on Thursday 4th October 2007
=
========================================================================
Available online at:
http://www.security-assessment.com/files/advisories/2007-10-04_Cart32_Ar
bitrary_File_Download.pdf

== Overview ==
Security-Assessment.com has discovered a highly critical vulnerability
within the Cart32 administrative application. The vulnerability allows
a remote unauthenticated user to arbitrarily download any file present
on the same physical disk that Cart32 is installed on.

The vulnerability stems from a NULL byte injection flaw within a file
read function.

== Exploitation ==

The function GetImage, part of c32web.exe displays various images from
a supplied "ImageName" variable.
http://host.com/scripts/c32web.exe/GetImage?ImageName=test.gif

C32web.exe attempts to prevent arbitrary files from being disclosed by
only returning files with an extension of .jpg, .gif, .png and .pdf.

Any file, of any extension type can be downloaded when a NULL byte is
injected into the ImageName variable with a valid file extension
suffixed
directly after.

Example
http://host.com/scripts/c32web.exe/GetImage?ImageName=somefile.txt%00.gi
f
http://host.com/scripts/c32web.exe/GetImage?ImageName=somefile.txt%00.jp
g
http://host.com/scripts/c32web.exe/GetImage?ImageName=somefile.txt%00.pd
f
http://host.com/scripts/c32web.exe/GetImage?ImageName=somefile.txt%00.pn
g

This vulnerability can be used to read any file on disk, including the
cart32 database.

== Solutions ==

A new build of Cart32 v6.4 is available to address this vulnerability.
Security-Assessment.com highly recommends all Cart32 users to upgrade.

== Credit ==

Discovered and advised to McMurtrey/Whitaker & Associates, Inc
October 2007 by Paul Craig of Security-Assessment.com

== Greetings ==

To all my fallen SA brothers.
SoSD
www.kiwicon.org : Will you be there?


== About Security-Assessment.com ==

Security-Assessment.com is Australasia's leading team of Information
Security consultants specialising in providing high quality Information
Security services to clients throughout the Asia Pacific region. Our
clients include some of the largest globally recognised companies in
areas such as finance, telecommunications, broadcasting, legal and
government. Our aim is to provide the very best independent advice and
a high level of technical expertise while creating long and lasting
professional relationships with our clients.

Security-Assessment.com is committed to security research and
development, and its team continues to identify and responsibly publish
vulnerabilities in public and private software vendor's products.
Members of the Security-Assessment.com R&D team are globally recognised
through their release of whitepapers and presentations related to new
security research.

Security-Assessment.com is an Endorsed Commonwealth Government of
Australia supplier and sits on the Australian Government
Attorney-General's Department Critical Infrastructure Project panel.
We are certified by both Visa and MasterCard under their Payment
Card Industry Data Security Standard Programs.



Paul Craig
Security-Assessment.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close