发布时间 :2005-05-02 00:00:00
修订时间 :2017-07-10 21:32:29

[原文]ProfitCode PayProCart 3.0 allows remote attackers to bypass authentication and gain administrative privileges to the admin control panel, as demonstrated via a direct request to adminshop/index.php with hex-encoded .. sequences in the ftoedit parameter.


        ProfitCode PayProCart 3.0允许远程攻击绕过认证并获取管理控制面板的管理权限,例如通过对在ftoedit参数中包含十六进制编码" .."序列的adminshop/index.php的直接请求可以触发该漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050404 Authenticaion bypass, Directory transversal and XSS
(UNKNOWN)  XF  payprocart-index-bypass-authentication(19956)

- 漏洞信息

高危 输入验证
2005-05-02 00:00:00 2005-10-20 00:00:00
        ProfitCode PayProCart 3.0允许远程攻击绕过认证并获取管理控制面板的管理权限,例如通过对在ftoedit参数中包含十六进制编码" .."序列的adminshop/index.php的直接请求可以触发该漏洞。

- 公告与补丁


- 漏洞信息

PayProCart adminshop/index.php Admin Authentication Bypass
Remote / Network Access Authentication Management, Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

PayProCart contains an input validation error in the authentication process that may allow a malicious user to bypass authentication and access the administrative control panel. The flaw exists because the application does not validate the 'ftoedit' parameter containing directory traversal style characters (ie: /../) upon submission to the 'adminshop/index.php' script.

- 时间线

2005-04-04 Unknow
2005-04-04 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

ProfitCode Software PayProCart Directory Traversal Vulnerability
Input Validation Error 13006
Yes No
2005-04-05 12:00:00 2009-07-12 11:56:00
Discovery is credited to Diabolic Crab <>.

- 受影响的程序版本

ProfitCode Software PayProCart 3.0

- 漏洞讨论

ProfitCode Software PayProCart may allow a remote attacker to carry out directory traversal attacks.

It is reported that this issue can be exploited by issuing a specially crafted HTTP GET request and supplying directory traversal sequences followed by a target file name through an affected parameter.

Reportedly, the attacker can gain access to file owned by the administrator and gain administrative access to the application by accessing the administrative panel. The attacker is able to gain access to the administrative panel without providing authentication credentials.

PayProCart versions 3.0 is affected by this issue. Other versions may be affected as well.

- 漏洞利用

An exploit is not required.

The following proof of concept can allow an attacker to gain administrative access to the application:;amp%3bftoedit=..%2fshopincs%2fmaintopENG

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考