Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7hjh-7hp4-wr4c

Опубликовано: 23 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.

A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.

EPSS

Процентиль: 99%
0.75339
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-94

Связанные уязвимости

nvd
7 месяцев назад

A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.

EPSS

Процентиль: 99%
0.75339
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-94