Hi All,
I am Maloy Roy Orko
Recently in one of my pentest research, I found a E-commerce System By Script And Tools which is an open source E-commerce Software.
Curious to explore its functionalities, I downloaded and set it up in my local system.
After fiddling with the source code, I found that the /admin/subscriber-csv.php file is vulnerable to Unauthorized access to subscriber data in 'admin/subscriber-csv.php' leading to potential data exposure.
It can lead into:
- - Privacy Violations
- - Reputational Damage
- - Legal and Regulatory Consequences
- - Increased Risk of Phishing and Spam
- - Operational Impact
- - Loss of Competitive Advantage
The Main Thing Is,If any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.
Thats why, I am trying to inform everyone about this.
Title of the Vulnerability:
Script and Tools | eCommerce 3.0 | admin/subscriber-csv.php - Information Disclosure
Vulnerability Class: Information Disclosure
CWE : CWE-200: Information Exposure
Product Name: eCommerce 3.0
Vendor: https:/github.com/scriptandtools/
Vulnerable Product Link:
https:/github.com/scriptandtools/eCommerce-website-in-PHP
Technical Details & Description:
The application source code is coded in a way which allows : Unauthorized access to subscriber data in '/admin/subscriber-csv.php' leading to potential data exposure.
Product & product Introduction:
eCommerce-3.0
Observation & Exploitation:
Here,The Vulnerable File Is:
/admin/subscriber-csv.php
Who will be affected of this attack?
->The Admin and The Subscribers!
The Subscriber emails,names abd informations can be sold by hackers!
Thus,the reputation of the company will be hampered!
Lets Exploit 🤝 : (Reproduction)
Just see this link:
192.168.0.100:8080/ecomm/admin/subscriber-csv.php
So,lets check it ?
When I gave a hit in this URL, Suddenly A CSV file Started To Be Downloaded even I wasn't logged in the site!
File Name: subscriber_list.csv
Screenshot:
The CSV file which was downloaded Is full of Subscriber Emails!
That means, Data Exposure Is Happening Here !
Prevention Strategies:
- - Implement Proper Access Controls
- - Use Secure Coding Practices
- - Validate User Input
- - Encrypt Sensitive Data
- - Regularly Audit and Monitor Access Logs
- - Conduct Security Training for Developers
- - Implement Data Minimization Principles
- - Use Web Application Firewalls (WAF)
- - Regularly Update and Patch Software
- - Perform Security Assessments and Penetration Testing
Conclusion :-
The main aim of this article is to show that if any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.But I also hope that it helps to give you ideas of how combining attacks can make them much more dangerous.