[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201802010049.w110nrIW030341@ip-100-122-159-248.us-east-1.ec2.aws.symcpe.net>
Date: Thu, 1 Feb 2018 00:49:53 GMT
From: ajcraggs@...il.com
To: bugtraq@...urityfocus.com
Subject: KonaKart Path Traversal Vulnerability
Product overview:
"KonaKart is a java based eCommerce software platform trusted by top brands throughout the world to give them a stable, high-
performance online store".
Vulnerability overview:
KonaKart eCommerce Platform prior to verion 8.8 is vulnerable to a directory traversal flaw in the admin console that would allow an attacker to download sensitive application or system files, or upload malicious files and take control of the server. The vulnerability exists due to improper validation of the upload file path.
The vendor has released version 8.8 which among other things, addresses this issue. It includes new functionality which allows administrators to pre-define allowed file paths and does not allow writing to or downloading from locations outside of these pre-defined file paths.
The vulnerability has been assigned CVE-2017-17108.
To mitigate the issue, users should:
- Apply the latest patch (ie. update to v8.8)
- Ensure default KonaKart default accounts are removed or have strong passwords set
- Restrict access to the shop administrative console via IP white listing
Timeline:
24/11/2017 - Vulnerability discovered
28/11/2017 - Vulnerability disclosed to vendor and discussion around impact and exploitability ensues.
04/12/2017 - CVE requested and assigned; vendor advised of CVE number. Work commences by vendor to fix issue and confirm patch resolves said vulnerability.
20/01/2018 - Patch released by vendor and users advised to patch.
Powered by blists - more mailing lists