Joomla! 1.6/1.7/2.5 Privilege Escalation Vulnerability

简介: http://www.wooyun.org/bugs/wooyun-2010-05526Joomla! 1.

http://www.wooyun.org/bugs/wooyun-2010-05526

Joomla! 1.6.x/1.7.x/2.5.0-2.5.2 suffers from a privilege escalation vulnerability that allows users to be registered into any group not having 'core.admin' privileges.

In order to be exploited, an attacker must visit index.php?option=com_users&view=registration and start creating a new user. During the initial creation, the attacker must cause the registration to fail by either NOT using the same password in both password fields or by purposefully failing the captcha (in 2.5.x). Before submitting the form, the attacker can use Firebug/Tamper Data to add the following parameter to the form data (assuming the site still has the default user groups enabled):

  • Firebug: <input name="jform[groups][]" value="7" />
  • Tamper Data: jform[groups][]=7

The form should reload, complaining that the passwords didn't match. This causes the group data to be stored into the session as form data. Once this is complete, giving valid values for the password fields and re-adding the parameter from before will cause the newly registered user to be assigned to the "Administrator" group because the user registration model reassigns the user to any group found to already exist in the session form data (but NOT to the groups directly given in the request).

After activating the account, the attacker will have a valid account with permissions to log in to the administrator/ interface, edit one of the templates, and inject php code (assuming the stock permissions/user groups are still in effect). Joomla! versions 1.6.x and 1.7.x also allow users in the "Administrator" group to install extensions, thus opening another avenue for code injection.

Joomla! versions 1.0.x, 1.5.x, and 2.5.3+ are not vulnerable. No patch has been issued for 1.6.x or 1.7.x and users of these versions are strongly urged to upgrade to 2.5.3 immediately.

Timeline

  • Vendor Notified: 11 March 2012
  • Vendor Response: 11 March 2012
  • Update Available: 15 March 2012
  • Disclosure: 15 March 2012
目录
相关文章
|
7月前
|
SQL 存储 安全
Vulnerability
【7月更文挑战第2天】
105 1
|
9月前
|
SQL 数据安全/隐私保护
[dvwa] Brute Force
[dvwa] Brute Force
|
数据库
CVE-2014-6283: Privilege Escalation Vulnerability and Potential Remote Code Execution in SAP Adaptiv
On May 12, 2014, SAP published updates to Adaptive Server Enterprise versions 15.
828 0
|
Shell Apache Linux
Kloxo 6.1.6 - Local Privilege Escalation
#!/bin/sh # Exploit Title: Kloxo Local Privilege Escalation # Google Dork: inurl:kiddie...
1099 0
|
SQL 安全 PHP
[waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin
Author: Janek Vind "waraxe"Date: 25. April 2013Location: Estonia, TartuWeb: http://www.
720 0
|
索引
Drupal 7.14 &lt;= Full Path Disclosure Vulnerability
################################################# Drupal 7.14
1103 0
|
SQL 关系型数据库 MySQL
Using SQLMap for Automated Vulnerability Assessment
Vulnerability assessors and code auditors are often faced with situations where a large volume ...
932 0
|
Shell
Privilege escalation vulnerabilities in Nagios XI installer
  ================ Privilege escalation vulnerabilities in Nagios XI installer < 2011R1.
1054 0

热门文章

最新文章