CVE-2024-5762

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-5762
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-5762.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-5762
Published
2024-08-21T17:15:08Z
Modified
2025-02-14T11:54:31.335003Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Zen Cart findPluginAdminPage Local File Inclusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Zen Cart. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the findPluginAdminPage function. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-21408.

References

Affected packages

Git / github.com/zencart/zencart

Affected ranges

Type
GIT
Repo
https://github.com/zencart/zencart
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.5.6

v1.*

v1.5.1
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.5a
v1.5.5b
v1.5.5c
v1.5.5d
v1.5.5e
v1.5.6
v1.5.6a
v1.5.6b
v1.5.6b-2019-05-27
v1.5.7
v1.5.8
v1.5.8-alpha
v1.5.8-alpha2
v1.5.8a
v1.5.8a-alpha