Mambo contains a flaw that allows a remote attacker to delete arbitrary files outside of the web path. The issue is due to the 'configuration.php' script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'com_media' variable.
An attacker must be logged in as administrator. This vulnerability primarily affects Mambo setups on multi-user/host environments.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Mambo contains a flaw that allows a remote attacker to delete arbitrary files outside of the web path. The issue is due to the 'configuration.php' script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'com_media' variable.
http://[victim]/administrator/index2.php?option=com_media&task=delete&delFile=configuration.php&listdir=/../..
Vendor URL: http://www.mamboserver.com/ Vendor Specific Advisory URL