WARNING! Fake news / Uwaga! Nota nieprawdziwa

Joomla Rssxt <= 1.0 Remote File Include Vulnerability (update)

2006.08.28
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Hi, crackers_child (at) sibersavascilar (dot) com [email concealed] schrieb am Fri, 18 Aug 2006 09:46:12 +0000: >Title : Joomla Rssxt <= 1.0 Remote File Include Vulnerability First: There ist no pinger.php or RPC.php in V 1.0. But they are in 2.0 Beta 1. So maybe you reportet the wrong version. >------------------------------------------- > >Bug > > >in pinger.php > > >require("../../configuration.php"); > >require("../../classes/mambo.php"); > >require("../../includes/sef.php"); > >require("$mosConfig_absolute_path/administrator/components/com_rssxt/ >class.rssxt.php"); $mosConfig_absolute_path is set in configuration.php. If it is not manipulated in classes/mambo.php or includes/sef.php there ist no way to change it. Surely not in pinger.php. >in RPC.php > > >require("../../configuration.php"); > > ... Same as above. >rssxt.php > > >include($mosConfig_absolute_path."/components/com_rssxt/includes/ >feedcreator.class.php"); > >require_once( $mosConfig_absolute_path."/administrator/components/ >com_rssxt/class.rssxt.php"); rssxt.php checks for direct calls, if you call it direct you got a 'die', but no code-execution oder file inclusion. No file inclusion at all. Regards Carsten -- Dipl.-Inform. Carsten Eilers IT-Sicherheit und Datenschutz <http://www.ceilers-it.de>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top