CVE-2024-21519: Arbitrary File Creation in opencart
(updated )
This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup.
Note:
It is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root.
References
- github.com/advisories/GHSA-7q3h-j95q-3vjh
- github.com/opencart/opencart
- github.com/opencart/opencart/blob/4.0.2.3/upload/admin/controller/tool/upload.php%23L353
- github.com/opencart/opencart/blob/master/upload/admin/controller/tool/upload.php%23L353
- nvd.nist.gov/vuln/detail/CVE-2024-21519
- security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266579
Detect and mitigate CVE-2024-21519 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →