Vulnerability Description
osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without sufficient input validation or access control. An unauthenticated attacker can craft a POST request to upload a .php file containing arbitrary code, which is then executed by the server.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/16899
- https://www.exploit-db.com/exploits/9556
- https://www.oscommerce.com/
- https://www.vulncheck.com/advisories/oscommerce-arbitrary-php-code-execution
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/16899
- https://www.exploit-db.com/exploits/9556
FAQ
What is CVE-2009-20006?
CVE-2009-20006 is a documented vulnerability. osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without suffic...
How severe is CVE-2009-20006?
CVSS scoring is not yet available for CVE-2009-20006. Check NVD for updates.
Is there a patch for CVE-2009-20006?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.