TomatoCart contains a flaw that is triggered when the /admin/json.php scripts fails to properly restrict the creation of files. With a specially crafted request, an attacker can specify arbitrary code via the 'content' parameter, that will be written to a file of their choice. Once uploaded, the newly created file can be used to increase privileges on the server.
Vendor Status:
Currently, We are not aware of any updates from the vendor
Disclosure Timeline:
Vendor Informed Date :2012-04-29
Disclosure Date :2013-01-04
Exploit Publish Date :2013-01-04