11th Jul 2002 [SBWID-5530]
COMMAND
Carello web shopping solution remote file execution
SYSTEMS AFFECTED
Carello 1.3
PROBLEM
In Matt Moore [matt@westpoint.ltd.uk] advisory [ID#:wp-02-0012]
[http://www.westpoint.ltd.uk] :
Carello uses hidden form fields to specify the names of executables on
the server which are to handle POSTed form data. This allows an
attacker to manipulate the HTML to specify arbitrary executables, which
the Carello server software will then run. For example, a typical
section of an HTML page created by Carello looks like (angle brackets
omitted):
form method=\"POST\" action= \"http://server/scripts/Carello/Carello.dll\"
input type=\"hidden\" name=\"CARELLOCODE\" value=\"WESTPOINT\"
input type=\"hidden\" name=\"VBEXE\" value= \"c:\\inetpub\\..carello-exe-file\"
input type=....etc etc
Carello .dll only appears to check that the string \'inetpub\' is in
the requested path.
Hence, specifying a value like:
c:\\inetpub\\..\\..\\..\\..\\..\\..\\winnt\\notepad.exe \'
bypasses this check, allowing arbitrary files to be executed.
SOLUTION
None yet
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH