ViArt Shop Enterprise 4.1 Arbitrary Command Execution Vulnerability

Title: ViArt Shop Enterprise 4.1 Arbitrary Command Execution Vulnerability
Advisory ID: ZSL-2012-5109
Type: Local/Remote
Impact: System Access
Risk: (4/5)
Release Date: 25.09.2012
Summary
Viart Shop is a PHP based e-commerce suite, aiming to provide everything you need to run a successful on-line business.
Description
Input passed to the 'DATA' POST parameter in 'sips_response.php' is not properly sanitised before being used to process product payment data. This can be exploited to execute arbitrary commands via specially crafted requests.

--------------------------------------------------------------------------------

Vuln:
-----
/payments/sips_response.php:
----------------------------

16: if (isset($_POST['DATA'])) {
17:
18: $params = " message=" . $_POST['DATA'];
19: $params .= " pathfile=" . $payment_params['pathfile'];
20: exec($payment_params['path_bin_resp'] . $params, $result);

-----------------------------------------------------------------------
Fix:
----
/payments/sips_response.php:
----------------------------

5: if (!defined("VA_PRODUCT")) {
6: header ("Location: ../index.php");
7: exit;
8: }
9:
10: if (isset($_POST['DATA'])) {
11:
12: $params = " message=" . $_POST['DATA'];
13: $params .= " pathfile=" . $payment_params['pathfile'];
14: exec($payment_params['path_bin_resp'] . $params, $result);

--------------------------------------------------------------------------------

Vendor
ViArt Software - http://www.viart.com
Affected Version
4.1, 4.0.8 and 4.0.5
Tested On
Microsoft Windows 7 Ultimate SP1 (EN)
Apache 2.4.2 (Win32)
PHP 5.4.4
MySQL 5.5.25a
Vendor Status
[09.09.2012] Vulnerability discovered.
[24.09.2012] Contact with the vendor.
[24.09.2012] Vendor responds asking more details.
[24.09.2012] Sent detailed information to the vendor.
[25.09.2012] Vendor confirms the vulnerability, issuing patch (http://www.viart.com/downloads/sips_response.zip).
[25.09.2012] Coordinated public security advisory released.
PoC
viart_cmdexec.php
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] http://www.viart.com/downloads/viart_shop-4.1.zip
[2] http://cxsecurity.com/issue/WLB-2012090225
[3] http://www.securityfocus.com/bid/55674
[4] http://packetstormsecurity.org/files/116876
[5] http://secunia.com/advisories/50701/
[6] http://1337day.com/exploits/19469
[7] http://xforce.iss.net/xforce/xfdb/78821
[8] http://www.osvdb.org/show/osvdb/85747
[9] http://www.exploit-db.com/exploits/21521/
Changelog
[25.09.2012] - Initial release
[26.09.2012] - Added reference [2], [3], [4] and [5]
[27.09.2012] - Added reference [6]
[28.09.2012] - Added reference [7] and [8]
[30.09.2012] - Added reference [9]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk