Joomla! Jms FileSeller Component "view" Local File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA44738

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44738/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44738

RELEASE DATE:
2011-05-31

DESCRIPTION:
Valentin Hoebel has reported a vulnerability in the Jms FileSeller
component for Joomla!, which can be exploited by malicious people to
disclose sensitive information.

Input passed via the "view" parameter to index.php (when "option" is
set to "com_jmsfileseller") is not properly verified before being
used to include files. This can be exploited to include arbitrary
files from local resources via directory traversal attacks and
URL-encoded NULL bytes.

The vulnerability is reported in version 1.0. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
Valentin Hoebel

ORIGINAL ADVISORY:
Valentin Hoebel:
http://www.xenuser.org/2011/05/28/joomla-component-com_jmsfileseller-local-file-inclusion-vulnerabilit/

RECENT ARTICLE

RECENT POST