Joomla! 1.6/1.7/2.5 Privilege Escalation Vulnerability

简介: http://www.wooyun.org/bugs/wooyun-2010-05526Joomla! 1.

http://www.wooyun.org/bugs/wooyun-2010-05526

Joomla! 1.6.x/1.7.x/2.5.0-2.5.2 suffers from a privilege escalation vulnerability that allows users to be registered into any group not having 'core.admin' privileges.

In order to be exploited, an attacker must visit index.php?option=com_users&view=registration and start creating a new user. During the initial creation, the attacker must cause the registration to fail by either NOT using the same password in both password fields or by purposefully failing the captcha (in 2.5.x). Before submitting the form, the attacker can use Firebug/Tamper Data to add the following parameter to the form data (assuming the site still has the default user groups enabled):

  • Firebug: <input name="jform[groups][]" value="7" />
  • Tamper Data: jform[groups][]=7

The form should reload, complaining that the passwords didn't match. This causes the group data to be stored into the session as form data. Once this is complete, giving valid values for the password fields and re-adding the parameter from before will cause the newly registered user to be assigned to the "Administrator" group because the user registration model reassigns the user to any group found to already exist in the session form data (but NOT to the groups directly given in the request).

After activating the account, the attacker will have a valid account with permissions to log in to the administrator/ interface, edit one of the templates, and inject php code (assuming the stock permissions/user groups are still in effect). Joomla! versions 1.6.x and 1.7.x also allow users in the "Administrator" group to install extensions, thus opening another avenue for code injection.

Joomla! versions 1.0.x, 1.5.x, and 2.5.3+ are not vulnerable. No patch has been issued for 1.6.x or 1.7.x and users of these versions are strongly urged to upgrade to 2.5.3 immediately.

Timeline

  • Vendor Notified: 11 March 2012
  • Vendor Response: 11 March 2012
  • Update Available: 15 March 2012
  • Disclosure: 15 March 2012
目录
相关文章
|
SQL Web App开发 监控
|
数据库
CVE-2014-6283: Privilege Escalation Vulnerability and Potential Remote Code Execution in SAP Adaptiv
On May 12, 2014, SAP published updates to Adaptive Server Enterprise versions 15.
799 0
Zimbra 0day exploit / Privilegie escalation via LFI
# Exploit Title: Zimbra 0day exploit / Privilegie escalation via LFI # Date: 06 Dec 2013 # E...
1362 0
|
网络架构 Python 数据格式
Atlassian Confluence - Sensitive Information Leakage
Hello list, Since vendor does not seem to care about this issue more than a year after initial report (https://jira.
696 0
|
Web App开发 PHP Apache
Apache suEXEC Privilege Elevation / Information Disclosure
Apache suEXEC privilege elevation / information disclosure   Discovered by Kingcope/Aug 2013  ...
932 0
|
Shell Apache Linux
Kloxo 6.1.6 - Local Privilege Escalation
#!/bin/sh # Exploit Title: Kloxo Local Privilege Escalation # Google Dork: inurl:kiddie...
970 0
|
索引
Drupal 7.14 &lt;= Full Path Disclosure Vulnerability
################################################# Drupal 7.14
1073 0
|
SQL 关系型数据库 MySQL
Using SQLMap for Automated Vulnerability Assessment
Vulnerability assessors and code auditors are often faced with situations where a large volume ...
911 0
|
Shell
Privilege escalation vulnerabilities in Nagios XI installer
  ================ Privilege escalation vulnerabilities in Nagios XI installer < 2011R1.
1032 0