First published: Thu Jul 27 2017(Updated: )
The traverseStrictSanitize function in admin_dir/includes/classes/AdminRequestSanitizer.php in ZenCart 1.5.5e mishandles key strings, which allows remote authenticated users to execute arbitrary PHP code by placing that code into an invalid array index of the admin_name array parameter to admin_dir/login.php, if there is an export of an error-log entry for that invalid array index.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | =1.5.5e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11675 is classified as a critical vulnerability due to its potential to allow remote authenticated users to execute arbitrary PHP code.
To fix CVE-2017-11675, ensure you upgrade Zen Cart to a patched version beyond 1.5.5e.
CVE-2017-11675 affects users of Zen Cart version 1.5.5e who have administrative privileges.
Exploiting CVE-2017-11675 allows an attacker to execute malicious PHP code on the server, leading to full system compromise.
CVE-2017-11675 is considered relatively easy to exploit for remote authenticated users with knowledge of array index manipulation.