FleetCart 4.1.1 Information Disclosure
2024-5-23 22:23:48 Author: packetstormsecurity.com(查看原文) 阅读量:5 收藏

# Exploit Title: FleetCart 4.1.1 - WebPage Content Information Disclosure
# Exploit Author: CraCkEr
# Date: 13/05/2024
# Vendor: EnvaySoft
# Vendor Homepage: https://codecanyon.net/item/fleetcart-laravel-ecommerce-system/23014826
# Software Demo Link: https://demo.fleetcart.envaysoft.com/en
# Tested on: Windows 11 Pro 22H2
# Impact: Sensitive Information Leakage
# CWE: CWE-200 - CWE-284 - CWE-266
# CVE: CVE-2024-5230
# CAPEC: CAPEC-19 / CAPEC-116
# ATT&CK: T1592

## Description

Issues with information disclosure in redirect responses. Accessing the majority of the website's pages exposes sensitive data, including the "Razorpay" "razorpayKeyId".

## Steps to Reproduce:

When you view the majority of the pages on the website, such as

https://demo.fleetcart.envaysoft.com/en/login
https://demo.fleetcart.envaysoft.com/en/categories/smartphones/products
https://demo.fleetcart.envaysoft.com/en/products?query=123

There is information leaking in the body page response.

+---------------------+
razorpayKeyId: 'rzp_test_oACp03vDsqdixc',
+---------------------+

Note: the same leaked "razorpayKeyId" is added to "Razorpay" in the Administration Panel.

on this Path:

https://demo.fleetcart.envaysoft.com/en/admin/settings?tab=razorpay (Login as Administrator)

[-] Done


文章来源: https://packetstormsecurity.com/files/178770/fleetcart411-disclose.txt
如有侵权请联系:admin#unsafe.sh