lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 1 Feb 2018 00:49:53 GMT
From: ajcraggs@...il.com
To: bugtraq@...urityfocus.com
Subject: KonaKart Path Traversal Vulnerability

Product overview:

"KonaKart is a java based eCommerce software platform trusted by top brands throughout the world to give them a stable, high-
performance online store".

Vulnerability overview:

KonaKart eCommerce Platform prior to verion 8.8 is vulnerable to a directory traversal flaw in the admin console that would allow an attacker to download sensitive application or system files, or upload malicious files and take control of the server. The vulnerability exists due to improper validation of the upload file path.

The vendor has released version 8.8 which among other things, addresses this issue. It includes new functionality which allows administrators to pre-define allowed file paths and does not allow writing to or downloading from locations outside of these pre-defined file paths.

The vulnerability has been assigned CVE-2017-17108.

To mitigate the issue, users should:

- Apply the latest patch (ie. update to v8.8)
- Ensure default KonaKart default accounts are removed or have strong passwords set
- Restrict access to the shop administrative console via IP white listing

Timeline:

24/11/2017 - Vulnerability discovered
28/11/2017 - Vulnerability disclosed to vendor and discussion around impact and exploitability ensues.
04/12/2017 - CVE requested and assigned; vendor advised of CVE number. Work commences by vendor to fix issue and confirm patch resolves said vulnerability.
20/01/2018 - Patch released by vendor and users advised to patch.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ