JOOMLA CMS 1.0.7 DoS & path disclosing

Credit: ghc ghc ru
Risk: Medium
Local: No
Remote: Yes

RST/GHC -- JOOMLA CMS -- ADVISORY #37 Product: Joomla Affected version: 1.0.7 Last version: 1.0.7 Vendor: Joomla! URL: online demo: VULNERABILITY CLASS: DoS, path disclosing [Product Description] Joomla! is a Content Management System (CMS) created by the same award-winning team that brought the Mambo CMS to its current state of stardom. [Summary] An attacker can invoke some undesirable situations for server administrator. [Details] 1. Real server path disclose and arbitrary filename creation. Vulnerable script: includes/feedcreator.class.php [code] function saveFeed($filename="", $displayContents=true) { if ($filename=="") { $filename = $this->_generateFilename(); } $feedFile = fopen($filename, "w+"); if ($feedFile) { fputs($feedFile,$this->createFeed()); fclose($feedFile); if ($displayContents) { $this->_redirect($filename); } [/code] Exploit: Vulnerable script: index.php?option=com_rss&feed=filename_here&no_html=1 An attacker can write simple code to soil the server by lots of cashed files. To disclose real path - just put slash symbol in the filename. 2. Denial of service. Vulnerable script: includes/phpInputFilter/class.inputfilter.php Anti-xss code will not cope with several tags. This can cause denial of servise. Exploit: index.php?option=com_poll&task=results&id=14&mosmsg=DOS@HERE<<>AAA<><> [DISCLOSURE TIMELINE] 09/02/06 - vendor notification 26/02/06 - new release (1.0.8) with bugfix bugs discovered by Foster RST/GHC

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top