Mambo Open Source / Joomla! GLOBALS Variable Remote File Include

high Nessus Plugin ID 20222

Synopsis

The remote web server contains a PHP application that is affected by a remote file include vulnerability.

Description

The version of Mambo Open Source or Joomla! running on the remote host is affected by a remote file include vulnerability due to allowing the the GLOBALS variable array to be overwritten whenever the PHP 'register_globals' setting is disabled. An unauthenticated, remote attacker can exploit this issue to disclose arbitrary files or execute arbitrary PHP code on the remote host, subject to the privileges of the web server user ID.

Solution

If using Mambo Open Source, apply the patch from the vendor. If using Joomla!, upgrade to version 1.0.4 or later.

See Also

https://seclists.org/fulldisclosure/2005/Nov/528

http://www.nessus.org/u?e9263098

http://www.nessus.org/u?835328a5

Plugin Details

Severity: High

ID: 20222

File Name: mambo_globals_file_includes.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 11/17/2005

Updated: 6/4/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 11/16/2005

Reference Information

CVE: CVE-2005-3738

BID: 15461