Joomla! "X_CMS_LIBRARY_PATH" Directory Traversal Vulnerability

SECUNIA ADVISORY ID:
SA33377

VERIFY ADVISORY:
http://secunia.com/advisories/33377/

CRITICAL:
Less critical

IMPACT:
Exposure of system information, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
Joomla! 1.x
http://secunia.com/advisories/product/5788/

DESCRIPTION:
irk4z has discovered a vulnerability in Joomla!, which can be
exploited by malicious people to disclose sensitive information.

Input passed to the "X_CMS_LIBRARY_PATH" HTTP header handled in
plugins/editors/xstandard/attachmentlibrary.php is not properly
verified before being used. This can be exploited to display
arbitrary directory contents via directory traversal attacks.

This vulnerability is confirmed in version 1.5.8. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
irk4z

ORIGINAL ADVISORY:
http://milw0rm.com/exploits/7691

RECENT ARTICLE

RECENT POST