Vulnerability Description
The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code'].
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opencart | Opencart | <= 3.0.2.0 |
Related Weaknesses (CWE)
References
- http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ExploitThird Party Advisory
- http://www.bigdiao.cc/2018/05/24/Opencart-v3-0-2-0/ExploitThird Party Advisory
FAQ
What is CVE-2018-11494?
CVE-2018-11494 is a vulnerability with a CVSS score of 8.0 (HIGH). The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step...
How severe is CVE-2018-11494?
CVE-2018-11494 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11494?
Check the references section above for vendor advisories and patch information. Affected products include: Opencart Opencart.