Script and Tools | eCommerce 3.0 | admin/subscriber-csv.php - Information Disclosure

Hi All, 


I am Maloy Roy Orko


Recently in one of my pentest research, I found a E-commerce System By Script And Tools which is an open source E-commerce Software.

Curious to explore its functionalities, I downloaded and set it up in my local system. 

After fiddling with the source code, I found that the /admin/subscriber-csv.php file is vulnerable to Unauthorized access to subscriber data in 'admin/subscriber-csv.php' leading to potential data exposure.

It can lead into:

  • - Privacy Violations  
  • - Reputational Damage  
  • - Legal and Regulatory Consequences  
  • - Increased Risk of Phishing and Spam
  • - Operational Impact  
  • - Loss of Competitive Advantage  

The Main Thing Is,If any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.

Thats why, I am trying to inform everyone about this.

Title of the Vulnerability: 

Script and Tools | eCommerce 3.0 | admin/subscriber-csv.php - Information Disclosure

Vulnerability Class: Information Disclosure

CWE : CWE-200: Information Exposure

Product Name: eCommerce 3.0 

Vendor: https:/github.com/scriptandtools/

Vulnerable Product Link:

https:/github.com/scriptandtools/eCommerce-website-in-PHP

Technical Details & Description: 

The application source code is coded in a way which allows : Unauthorized access to subscriber data in '/admin/subscriber-csv.php' leading to potential data exposure.

Product & product Introduction

eCommerce-3.0

Observation & Exploitation: 

Here,The Vulnerable File Is:

/admin/subscriber-csv.php

Who will be affected of this attack?

->The Admin and The Subscribers

The Subscriber emails,names abd informations can be sold by hackers!

Thus,the reputation of the company will be hampered!

Lets Exploit 🤝 : (Reproduction)

Just see this link:

192.168.0.100:8080/ecomm/admin/subscriber-csv.php

So,lets check it ?



When I gave a hit in this URL, Suddenly A CSV file Started To Be Downloaded even I wasn't logged in the site! 

File Name: subscriber_list.csv

Screenshot:




The CSV file which was downloaded Is full of Subscriber Emails!



That means, Data Exposure Is Happening Here !

Prevention Strategies:

  • - Implement Proper Access Controls  
  • - Use Secure Coding Practices  
  • - Validate User Input  
  • - Encrypt Sensitive Data  
  • - Regularly Audit and Monitor Access Logs  
  • - Conduct Security Training for Developers  
  • - Implement Data Minimization Principles  
  • - Use Web Application Firewalls (WAF)  
  • - Regularly Update and Patch Software  
  • - Perform Security Assessments and Penetration Testing  

Conclusion :- 

The main aim of this article is to show that if any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.But I also hope that it helps to give you ideas of how combining attacks can make them much more dangerous. 

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post