SECUNIA ADVISORY ID:
SA33377
VERIFY ADVISORY:
http://secunia.com/advisories/33377/
CRITICAL:
Less critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
Joomla! 1.x
http://secunia.com/advisories/product/5788/
DESCRIPTION:
irk4z has discovered a vulnerability in Joomla!, which can be
exploited by malicious people to disclose sensitive information.
Input passed to the "X_CMS_LIBRARY_PATH" HTTP header handled in
plugins/editors/xstandard/attachmentlibrary.php is not properly
verified before being used. This can be exploited to display
arbitrary directory contents via directory traversal attacks.
This vulnerability is confirmed in version 1.5.8. Other versions may
also be affected.
SOLUTION:
Edit the source code to ensure that input is properly verified.
PROVIDED AND/OR DISCOVERED BY:
irk4z
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/7691