First published: Sat Jun 22 2024(Updated: )
This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup. **Note:** It is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
composer/opencart/opencart | >=4.0.0.0 | |
OpenCart | >=4.0.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21519 is classified as a high severity vulnerability due to its potential for arbitrary file creation.
To fix CVE-2024-21519, upgrade to a patched version of OpenCart that addresses this vulnerability.
CVE-2024-21519 affects OpenCart versions starting from 4.0.0.0.
An attacker with admin privileges can exploit CVE-2024-21519 to create arbitrary backup files.
The database restoration functionality of OpenCart is vulnerable in CVE-2024-21519.