Home page logo

bugtraq logo Bugtraq mailing list archives

Re: DCShop vulnerability
From: David Choi <dcscripts () yahoo com>
Date: Mon, 18 Jun 2001 20:35:19 -0700 (PDT)

This is not really a vulnerability.  It is more a
server setup problem.

Normally, you should not be able to browse files in
/cgi-bin directory; you should only be able to execute
scripts and display the page resulting from them. 
BUT, we do live in an imperfect world and some server
DO allow viewing of files in /cgi-bin directory and so
IT IS a problem, nonetheless.  To eliminate this
problem, please see



David S. Choi

--- Peter Helms <peter.helms () ey dk> wrote:
DCShop vulnerability

We have seen several Web shops using your 
DCShop product as E-commerce system, where it is 
possble for unauthorized persons via a Web browser 
to retrieve customer creditcard numbers in
Athough the developers on their Web site 
recommends not to use the beta product for 
commercial use, we have found sites already using it


The issue does not show up on properly configured 
servers, i.e. where the "Everyone"-group has "Full 
Access" to the CGI-BIN or sub-folders, more info 

The requests are made of the following URL:

This will triger the Web host to send a text file
with all 
recent orders, including the end-users name, 
shipping and billing-address, e-mail address AND 
CREDIT CARD NUMBERS with exp-dates.

It is also in some cases possible to find the 
administrator name and password in another text file

from an URL:

We have reported this issue to the developer, 
DCscripts.com, who within hours posted a security 
issue bulletin on their web site to clarify the 
recommendations for their software:

Peter Helms
Ernst & Young, Denmark
peter.helms () ey dk

Do You Yahoo!?
Spot the hottest trends in music, movies, and more.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]