exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mambo-joomla.txt

mambo-joomla.txt
Posted Apr 28, 2006
Site kapda.ir

Mambo / Joomla do not properly validate user-supplied input in rss.php.A remote user can supply a specially crafted URL to cause the system to display an error message that discloses the installation Path or force the script to create Tons of superfluous xml files which in some cases results in remote DOS attacks against target.

tags | advisory, remote, php
SHA-256 | db42190082b571f33f9fecedb2b59dcaab5850e3a505040dbd582a73a9528652

mambo-joomla.txt

Change Mirror Download
KAPDA New advisory

Mambo website : http://www.mamboserver.com
Bug: Path Disclosure & Remote Denial Of Service
Exploitation: Remote with browser
Exploit: available

Description:
--------------------
Mambo is a feature-rich dynamic portal engine/content
management tool capable of building sites from several
pages to several thousand. Mambo uses PHP/MySQL and
features a very comprehensive admin manager.

Vulnerability:
--------------------
The Script does not properly validate user-supplied
input in rss.php.A remote user can supply a specially
crafted URL to cause the system to display an error
message that discloses the installation Path or force
the script to create Tons of superfluous xml files
which in some cases results in remote DOS attacks
against target.
Lets see Code Snippets:

/components/com_rss/rss.php

[#73-74]
// get feed type from url
$info[ 'feed' ] = mosGetParam( $_GET, 'feed', 'RSS2.0'
);

[#91-93]
// set filename for rss feeds
$info[ 'file' ] = strtolower( str_replace( '.', '',
$info[ 'feed' ] ) );
$info[ 'file' ] = $mosConfig_absolute_path .'/cache/'.
$info[ 'file' ] .'.xml';

[#244-245]
// save feed file
$rss->saveFeed( $info[ 'feed' ], $info[ 'file' ],
$showFeed );


/includes/feedcreator.class.php // FeedCreator
class v1.7.2 , originally (c) Kai Blankenhorn
[#681-697]

function saveFeed($filename="",
$displayContents=true) {
if ($filename=="") {
$filename = $this->_generateFilename();
}
$feedFile = fopen($filename, "w+");
if ($feedFile) {
fputs($feedFile,$this->createFeed());
fclose($feedFile);
if ($displayContents) {
$this->_redirect($filename);
}
} else {
echo "<br /><b>Error creating feed file, please
check write permissions.</b><br />";
}
}

}

Demonstration URL:
--------------------
http://example.com/index2.php?option=com_rss&feed=test\/>
Warning: fopen(path\to\mambo\test\\/>.xml)
[function.fopen]: failed to open stream: No such file
or directory in
path\to\mambo\includes\feedcreator.class.php on line
685

DDOS:
--------------------
Its possible to perform distributed denial of service
attacks against Installed mambo on IIS servers
Specially when php runs as ISAPI module.
requesting
http://example.com/index2.php?option=com_rss&feed=arbitraryfilenames
will cause remote script to save arbitrary files in
cache folder And large amount of request will cause
IIS to returen "HTTP 403.9 - Access Forbidden: Too
many users are connected
Internet Information Services" to legitimate users.
Or from php5 as isapi module :
"PHP has encountered an Access Violation at 77F6103A"

Solution:
--------------------
There is no vendor supplied patch for this issue at
this time.

Original Advisories:
--------------------
http://www.kapda.ir/advisory-313.html [with
exploit]
IN Farsi:
http://irannetjob.com/content/view/209/28/

Credit :
--------------------
Discovered & released by trueend5 (trueend5 kapda ir)
Security Science Researchers Institute Of Iran
[http://www.KAPDA.ir]

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close