Description
The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code'].
Remediation
References
Related Vulnerabilities
WordPress Plugin Google Maps CP Cross-Site Scripting (1.0.3)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-4303)
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-3376)
Chamilo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-39061)