header-logo
Suggest Exploit
vendor:
Joomla
by:
B-HUNT3|2
5,5
CVSS
MEDIUM
Directory Traversal
22 (Path Traversal)
CWE
Product Name: Joomla
Affected Version From: 1.0.5
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: LocalHost
N/A

Joomla (com_ccnewsletter) Directory Traversal Vulnerability

Input var controller is vulnerable to Directory Traversal Vuln. A proof of concept is provided which involves accessing the http://server/[JOOMLA_PATH]/index.php?option=com_ccnewsletter&view=ccnewsletter&Itemid=87&controller=[-DT-] URL with [-DT-] replaced by ;) to exploit the vulnerability.

Mitigation:

Ensure that user input is properly sanitized and validated to prevent directory traversal attacks.
Source

Exploit-DB raw data:

[~]>> ...[BEGIN ADVISORY]...

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> TITLE: Joomla (com_ccnewsletter) Directory Traversal Vulnerability
[~]>> LANGUAGE: PHP
[~]>> DORK: N/A
[~]>> RESEARCHER: B-HUNT3|2
[~]>> CONTACT: bhunt3r[at_no_spam]gmail[dot_no_spam]com
[~]>> TESTED ON: LocalHost
[~]>> (( -- Sorry for not including a single advisory with this Component --))

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> DESCRIPTION: Input var controller is vulnerable to Directory Traversal Vuln
[~]>> AFFECTED VERSIONS: Confirmed in 1.0.5 but probably other versions also
[~]>> RISK: Medium/High
[~]>> IMPACT: Access to all PHP files in WebServer (Null Byte is filtered)

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> PROOF OF CONCEPT:

[~]>> http://server/[JOOMLA_PATH]/index.php?option=com_ccnewsletter&view=ccnewsletter&Itemid=87&controller=[-DT-]

[~]>> [-DT-] -->  ;)

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

[~]>> ...[END ADVISORY]...