[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1152817982.30531.4.camel@localhost.localdomain>
Date: Thu, 13 Jul 2006 21:13:02 +0200
From: Joxean Koret <joxeankoret@...oo.es>
To: matdhule@...il.com
Cc: bugtraq@...urityfocus.com
Subject: Re: [ECHO_ADV_38$2006] Multiple Mambo/Joomla Component Remote File
Include Vulnerabilities
Hello,
El jue, 13-07-2006 a las 01:35 +0000, matdhule@...il.com escribió:
>
> require_once( $mosConfig_absolute_path .
> '/includes/domit/xml_domit_lite_include.php' );
>
> ------------------------------------------------------------
>
> Variables $mosConfig_absolute_path are not properly sanitized. When
> register_globals=on
> and allow_fopenurl=on an attacker can exploit this vulnerability with
> a
> simple php injection script.
I think that even if allow_fopenurl is not on you can open remote files
by using UNC style paths, such as \\mymachine\myresource\, of course,
under Win32 environments.
--
Zer gutxi balio duen langileen bizitza
Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)
Powered by blists - more mailing lists