This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup.
**Note:**
It is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root.
References
Link | Resource |
---|---|
https://github.com/opencart/opencart/blob/4.0.2.3/upload/admin/controller/tool/upload.php%23L353 | |
https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266579 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2024-06-22T05:00:04.894Z
Updated: 2024-06-27T12:40:12.894Z
Reserved: 2023-12-22T12:33:20.120Z
Link: CVE-2024-21519
JSON object: View
NVD Information
Status : Modified
Published: 2024-06-22T05:15:11.620
Modified: 2024-06-27T13:15:55.027
Link: CVE-2024-21519
JSON object: View
Redhat Information
No data.
CWE