Backdoor in Cart32 Software

Backdoor in Cart32 Software
Reported April 27, 2000 by
Cerberus Information Security
  • Cart32 v2.6 and 3.0 -- Web-based shopping cart software


The Cerberus Security Team has discovered a backdoor in McMurtrey/Whitaker & Associates, Inc"s Cart32 software.The backdoor can be used to gain access to sensitive information such as passwords and credit card information. In addition, arbitrary commands may be run on a remote server, and the administratrive password may be changed without knowledge of the current administrative password.

Within cart32.exe there is a secret backdoor password of "wemilo" that can be found at file offset 0x6204h. The password is known internally to the software as the Cart32Password.


With knowledge of this password an attacker can go to one of several undocument URLs such
as http://abc123/scripts/cart32.exe/cart32clientlist and obtain a list the passwords for each Cart32 shopping site on the server.A specially crafted URL could allow an attacker to configure the server so that it runs commands when an order is confirmed. For example, the following URL would set the cart"s properties to spawn a shell, perform a directory listing and pipe the output to a file called file.txt on the root of the C: drive when an order is confirmed.



The vendor issued a patch to remove the backdoors.

Discovered and reported by
Cerberus Information Security
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.