Security Images for Joomla server.php mosConfig_absolute_path Variable Remote File Inclusion

2006-07-28T12:19:02
ID OSVDB:27658
Type osvdb
Reporter Drago84()
Modified 2006-07-28T12:19:02

Description

Vulnerability Description

Security Images for Joomla contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to server.php not properly sanitizing user input supplied to the 'mosConfig_absolute_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Security Images for Joomla contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to server.php not properly sanitizing user input supplied to the 'mosConfig_absolute_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://forge.joomla.org/sf/projects/com_securityimages Vendor Specific News/Changelog Entry: http://forum.joomla.org/index.php/topic,81589.0.html Vendor Specific News/Changelog Entry: http://forum.joomla.org/index.php/topic,79477.0.html Secunia Advisory ID:21260 Related OSVDB ID: 27655 Related OSVDB ID: 27656 Related OSVDB ID: 27657 Generic Exploit URL: http://milw0rm.com/exploits/2083 CVE-2006-5048