Joomla Camp26 VisitorData Module Shell Command Injection Vulnerability

SECUNIA ADVISORY ID:
SA39707

VERIFY ADVISORY:
http://secunia.com/advisories/39707/

DESCRIPTION:
A vulnerability has been discovered in the Camp26 VisitorData module
for Joomla, which can be exploited by malicious people to compromise
a vulnerable system.

Input passed via the "X-Forwarded-For" HTTP header is not properly
sanitised before being used as a command line argument in
tmpl/default.php. This can be exploited to inject arbitrary shell
commands

The vulnerability is confirmed in version 1.1. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
Chip D3 Bi0s

ORIGINAL ADVISORY:
http://elotrolad0.blogspot.com/2010/05/modvisitordata-joomla-remoce-code.html

RECENT ARTICLE

RECENT POST