Description
Zen Cart 1.3.8a, 1.3.8, and earlier does not require administrative authentication for admin/record_company.php, which allows remote attackers to execute arbitrary code by uploading a .php file via the record_company_image parameter in conjunction with a PATH_INFO of password_forgotten.php, then accessing this file via a direct request to the file in images/.
Remediation
References
Related Vulnerabilities
Apache HTTP Server Other Vulnerability (CVE-2003-1307)
WordPress Plugin Social Sharing-Social Warfare Malicious Code (4.4.7.1)
WordPress Plugin Thrive Ultimatum Security Bypass (2.3.9.3)
Django Resource Management Errors Vulnerability (CVE-2014-0481)
WordPress Plugin Broken Link Checker Cross-Site Scripting (1.10.4)