[VIM] False: Joomla/Mambo Jambook v1.0 beta7 Rfi Vuln.

George A. Theall theall at tenablesecurity.com
Tue Apr 17 02:04:30 UTC 2007


Bugtraq 23509 looks false. It concerns a remote file include flaw in a 
third-party component for Mambo / Joomla called Jambook. I installed 1.0 
beta7, which crazy_king claims is affected. Here's the code in 
'components/com_jambook/jambook.php':

   if ( !defined( '_VALID_MOS' ) && !defined('_JEXEC') ) die( 'Direct 
Access to this location is not allowed.' );

   global $option, $Itemid;

   //Get right Language file
   if ( file_exists( 
"$mosConfig_absolute_path/components/$option/language/$mosConfig_lang.php" 
) ) {
 
include_once("$mosConfig_absolute_path/components/$option/language/$mosConfig_lang.php");
   } else {
 
include_once("$mosConfig_absolute_path/components/$option/language/english.php");
   }

   // Read configuration file
 
include_once("$mosConfig_absolute_path/components/$option/configuration.php");

   // Read a file containing the jxTemplate class
 
require_once("$mosConfig_absolute_path/components/$option/jxtemplate.php");

   // Read frontend html classes
   require_once( $mainframe->getPath( 'front_html' ) );

   // Read database class information
   require_once( $mainframe->getPath( 'class' ) );

   // Read a file with common functions
 
require_once("$mosConfig_absolute_path/components/$option/jambook.common.php");

   // Read a file with the CAPTCHA class
 
require_once("$mosConfig_absolute_path/components/$option/ocr_captcha.class.php");

Clearly, this file can't be called directly, so this advisory is bogus. 
I wonder, though, why crazy_king felt the need to skip the first couple 
of similar function calls and alert us to the require_once() later on. 
Perhaps we'll be treated with similar warnings from him in the future...


George
-- 
theall at tenablesecurity.com


More information about the VIM mailing list