Joomla! Frontend-User-Access "controller" Local File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA43137

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/43137/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=43137

RELEASE DATE:
2011-02-02

DESCRIPTION:
A vulnerability has been discovered in Frontend-User-Access component
for Joomla!, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed via the "controller" parameter to index.php (when
"option" is set to "com_frontenduseraccess") is not properly verified
before being used. This can be exploited to include arbitrary files
from local resources via directory traversal sequences and
URL-encoded NULL bytes.

The vulnerability is confirmed in version 3.4.1 (free version). Other
versions may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
wishnusakti + inc0mp13te

RECENT ARTICLE

RECENT POST