COMMAND

    Carello web shopping cart

SYSTEMS AFFECTED

    Windows NT running IIS

PROBLEM

    Following is based on  Cerberus Security Team Advisory  (by Robert
    Horton).   The Cerberus  Security Team  have discovered  a flaw in
    the Carello  web shopping  cart that  enables attackers  to create
    files on the server's computer.  If the file already exists,  then
    a copy  of it  is made  with a  slightly different file extension.
    For example  foo.txt becomes  foo.txt1.   This becomes exploitable
    when a  copy is  made of  foo.asp as  its contents  are copied  to
    foo.asp1 which is  not a recognised  file format.   When this page
    is then requested the source  code is downloaded.  This  can often
    contain sensitive information such as passwords and the like.

    The following url:

        http://charon/scripts/Carello/add.exe?C:\inetpub\iissamples\default\samples.asp

    will create samples.asp1 which can  then be viewed.  The  attacker
    needs to  know the  full path  of the  file that  he/she wishes to
    copy.  This is not difficult to  work out as many of the links  in
    the Carello Web product give  this information away.  There  are a
    large number of executables in the /scripts/Carello directory, and
    all of the ones tested have exhibited this behaviour.  It must  be
    noted however, that the NTFS  permissions must also allow for  the
    anonymous Internet  account to  be able  to write  to the relevant
    directory.

SOLUTION

    PSPInc were  informed of  this.   This product  is no longer being
    supported although they  say that a  new version is  due out in  a
    couple of months which fixes these problems.