Vulnerability Description
Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zen Cart | Zen Cart | 1.3.8 |
Related Weaknesses (CWE)
References
- http://osvdb.org/46912
- http://secunia.com/advisories/31039Vendor Advisory
- http://www.attrition.org/pipermail/vim/2008-July/002028.htmlExploit
- http://www.securityfocus.com/bid/30179Exploit
- http://www.zen-cart.com/forum/showthread.php?t=102802Exploit
- https://www.exploit-db.com/exploits/6038
- http://osvdb.org/46912
- http://secunia.com/advisories/31039Vendor Advisory
- http://www.attrition.org/pipermail/vim/2008-July/002028.htmlExploit
- http://www.securityfocus.com/bid/30179Exploit
- http://www.zen-cart.com/forum/showthread.php?t=102802Exploit
- https://www.exploit-db.com/exploits/6038
FAQ
What is CVE-2008-6877?
CVE-2008-6877 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files v...
How severe is CVE-2008-6877?
CVE-2008-6877 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6877?
Check the references section above for vendor advisories and patch information. Affected products include: Zen Cart Zen Cart.