Joomla MyBlog Component "task" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38777

VERIFY ADVISORY:
http://secunia.com/advisories/38777/

DESCRIPTION:
A vulnerability has been reported in the MyBlog component for Joomla,
which can be exploited by malicious people to disclose potentially
sensitive information.

Input passed to the "task" parameter in index.php (when "option" is
set to "com_myblog") is not properly sanitised before being used to
include files. This can be exploited to include arbitrary files from
local resources via directory traversal attacks and URL-encoded NULL
bytes.

The vulnerability is reported in version 3.0.329. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
DevilZ TM

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/11625

RECENT ARTICLE

RECENT POST