Joomla! / Mambo Component 'view' Parameter Local File Include

critical Nessus Plugin ID 45490

Synopsis

The remote web server contains a PHP application that is affected by a local file include vulnerability.

Description

The remote host contains a component for Joomla! or Mambo that fails to sanitize user-supplied input to the 'view' parameter in a GET request before using it to include PHP code. Regardless of the PHP 'register_globals' setting, an unauthenticated, remote attacker can exploit this issue to disclose arbitrary files or possibly execute arbitrary PHP code on the remote host, subject to the privileges of the web server user ID.

Solution

Contact the vendor of each affected component to see if an upgrade is available or else disable it.

Plugin Details

Severity: Critical

ID: 45490

File Name: joomla_components_view_lfi.nasl

Version: 1.30

Type: remote

Family: CGI abuses

Published: 4/12/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: www/PHP

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 4/5/2010

Vulnerability Publication Date: 4/4/2010

Exploitable With

Elliot (Joomla Component com_tweetla 1.0.1 LFI)

Reference Information

CVE: CVE-2010-1313, CVE-2010-1476, CVE-2010-1531, CVE-2010-1533, CVE-2010-1535, CVE-2010-1983, CVE-2010-2128

BID: 39206, 39211, 39237, 39393, 40187, 41357