OSVDB ID: 62041

Title: AutartiTarot Component for Joomla! administrator/index.php controller Parameter Traversal Local File Inclusion

Info

Disclosure

Feb 01, 2010

Discovery

Unknown

Dates

Exploit

Unknown

Solution

Unknown

Description

AutartiTarot Component for Joomla! contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'administrator/index.php' script not properly sanitizing user input (when "option" is set to "com_autartitarot"), specifically directory traversal style attacks (e.g., ../../)and URL-encoded NULL bytes, supplied to the 'controller' parameter. This may allow an attacker to include a file from the targeted host that contains arbitrary commands or code that will be executed by the vulnerable script. Such attacks are limited due to the script only calling files already on the target host. In addition, this flaw can potentially be used to disclose the contents of any file on the system accessible by the web server.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Integrity
Solution: Solution Unknown
Exploit: Exploit Public
Disclosure: Uncoordinated Disclosure
OSVDB: Web Related

Solution

Products

Unknown or Incomplete

References

Credit

Unknown or Incomplete



Direct URL: http://osvdb.org/62041