Vulnerability Description
MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://web.archive.org/web/20120919081957/http://mobilecartly.com/
- https://www.exploit-db.com/exploits/20422
- https://www.exploit-db.com/exploits/21079
- https://www.vulncheck.com/advisories/mobilecartly-arbitrary-file-creation
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/20422
- https://www.exploit-db.com/exploits/21079
FAQ
What is CVE-2012-10044?
CVE-2012-10044 is a documented vulnerability. MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_...
How severe is CVE-2012-10044?
CVSS scoring is not yet available for CVE-2012-10044. Check NVD for updates.
Is there a patch for CVE-2012-10044?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.