Summary
The host is installed with OpenCart and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to execute arbitrary HTML or script code, discloses the software's installation path resulting in a loss of confidentiality.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaws are due to,
- Input passed via the 'zone_id' POST parameter to index.php is not properly sanitised before being returned to the user.
- Insufficient authorization accessing 'system/logs/error.txt' which displays the full installation path within error messages.
- Insufficient validity checks to verify the HTTP requests made by user.
Affected
OpenCart version 1.5.6 and probably previous versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is vulnerable or not.
References