Joomla! Component CCNewsLetter - Directory Traversal
Author: B-HUNT3|2
type: webapps
platform: php
port:
date_added: 2010-01-27
date_updated: 2017-07-28
verified: 1
codes: OSVDB-62000;CVE-2010-0467
tags:
aliases:
screenshot_url:
application_url:
[~]>> ...[BEGIN ADVISORY]...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> TITLE: Joomla (com_ccnewsletter) Directory Traversal Vulnerability
[~]>> LANGUAGE: PHP
[~]>> DORK: N/A
[~]>> RESEARCHER: B-HUNT3|2
[~]>> CONTACT: bhunt3r[at_no_spam]gmail[dot_no_spam]com
[~]>> TESTED ON: LocalHost
[~]>> (( -- Sorry for not including a single advisory with this Component --))
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> DESCRIPTION: Input var controller is vulnerable to Directory Traversal Vuln
[~]>> AFFECTED VERSIONS: Confirmed in 1.0.5 but probably other versions also
[~]>> RISK: Medium/High
[~]>> IMPACT: Access to all PHP files in WebServer (Null Byte is filtered)
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> PROOF OF CONCEPT:
[~]>> http://server/[JOOMLA_PATH]/index.php?option=com_ccnewsletter&view=ccnewsletter&Itemid=87&controller=[-DT-]
[~]>> [-DT-] --> ;)
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[~]>> ...[END ADVISORY]...