Vulnerabilities > CVE-2004-0241 - Remote Command Execution vulnerability in Qualiteam X-Cart
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
X-Cart 3.4.3 allows remote attackers to execute arbitrary commands via the perl_binary argument in (1) upgrade.php or (2) general.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Exploit-Db
description Qualiteam X-Cart 3.x upgrade.php perl_binary Parameter Arbitrary Command Execution. CVE-2004-0241. Webapps exploit for php platform id EDB-ID:23637 last seen 2016-02-02 modified 2004-02-03 published 2004-02-03 reporter Philip source https://www.exploit-db.com/download/23637/ title Qualiteam X-Cart 3.x upgrade.php perl_binary Parameter Arbitrary Command Execution description Qualiteam X-Cart 3.x general.php perl_binary Parameter Arbitrary Command Execution. CVE-2004-0241. Webapps exploit for php platform id EDB-ID:23636 last seen 2016-02-02 modified 2004-02-03 published 2004-02-03 reporter Philip source https://www.exploit-db.com/download/23636/ title Qualiteam X-Cart 3.x general.php perl_binary Parameter Arbitrary Command Execution
Nessus
NASL family | CGI abuses |
NASL id | QUALITEAM_XCART_CMD_EXEC.NASL |
description | The remote host is running Qualiteam X-Cart - a shopping cart software written in PHP. There is a bug in this software that could allow an attacker to execute arbitrary commands on the remote web server with the privileges of the web user. In addition to this, there are some flaws that could allow an attacker to obtain more information about the remote server, like the physical location of the remote web root. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12040 |
published | 2004-02-03 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12040 |
title | Qualiteam X-Cart Multiple Script perl_binary Parameter Arbitrary Command Execution |
code |
|