Summary: | www-apps/joomla < 1.0.11 remote file include | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matt Drew (RETIRED) <aetius> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | web-apps |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/bugtraq/2006/Nov/0080.html | ||
Whiteboard: | B4 [upstream?] | ||
Package list: | Runtime testing required: | --- |
Description
Matt Drew (RETIRED)
2006-11-07 04:24:33 UTC
s/executable/exploitable. Follow up on BT. If this is correct it should be closed as INVALID. 1. The installation directory is to be removed after the installation of Joomla!. If you do not follow the instructions - your fault. Having the installation files still on your webserver makes your whole server totally prone of being hijacked, since you can rewrite the configuration. So no need for some remote file inclusion when you can just reset the site with install files... 2. The admin.admin.html.php file is not directly accessible: "// no direct access defined( '_VALID_MOS' ) or die( 'Restricted access' );" So I do not see how this could be exploitable at all. Anyways, this all only works if you have register_globals enabled, which is strongly discouraged by Joomla!, it even gives you big red warnings to turn it off everytime you enter the admin backend. Hacks is what you get when ignoring security warnings. regards Sascha Resolving as INVALID - we've already updated past this. |