Joomla JE Story Submit Component "view" File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA40390

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40390/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40390

RELEASE DATE:
2010-06-29
DESCRIPTION:
A vulnerability has been reported in the JE Story Submit component
for Joomla, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "view" parameter in index.php (when "option" is
set to "com_jesubmit") is not properly verified before being used to
include files. This can be exploited to include arbitrary files from
local resources via directory traversal attacks and URL-encoded NULL
bytes.

The vulnerability is reported in version 1.3. Other versions may also
be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
Sid3^effects


RECENT ARTICLE

RECENT POST