Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Forum/Board/Portal)  >   Mambo Site Server Vendors:
Mambo Server Cache_library Input Validation Hole Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1011365
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 20 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 4.5 (1.0.9)
Description:   Two vulnerabilities were reported in Mambo Server. A remote user can execute arbitrary commands on the target system. A remote user can also conduct cross-site scripting attacks.

Jose Antonio Coret (Joxean Koret) reported that there is an include file error in the Cache_library that allows a remote user to specify a remote location for the 'mosConfig_absolute_path' parameter to cause the target server to include and execute PHP code from the remote location. The PHP code, including operating system commands, will be executed with the privileges of the target web service.

A demonstration exploit URL is provided:


It is also reported that the 'index.php' script does not properly validate user-supplied input in the Itemid, mosmsg, and limit parameters. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Mambo Server software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:



Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Mambo Server software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   The vendor has issued a fix, available via CVS.
Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Vulnerabilities in TUTOS

              Two Vulnerabilities in Mambo 
Author: Jose Antonio Coret (Joxean Koret) 
Date: 2004  
Location: Basque Country 
Affected software description: 
Mambo 4.5 (1.0.9) 
Mambo is one of the most powerful Open 
Source Content Management Systems on  
the planet. It is used all over the world for 
everything from simple websites  
to complex corporate applications. Mambo is 
easy to install, simple to manage,  
and reliable. 
Web : 
A. Cross Site Scripting 
A1. The first vulnerability that I found is in the 
script index.php. The following 
parameters are vulnerables : Itemid, mosmsg 
and limit. 
Examples :  
B. Remote Code Execution 
B1. The simple hack made to the Cache_library 
makes mambo vulnerable to a 
remote arbitrary code execution attacks.  
Example :  
The file 
mambo/includes/Cache/Lite/Function.php looks 
like : 
* This class extends Cache_Lite and can be 
used to cache the result and output of 
* This class is completly inspired from 
Sebastian Bergmann's 
* PEAR/Cache_Function class. This is only an 
adaptation to 
* Cache_Lite 
* There are some examples in the 
'docs/examples' file 
* Technical choices are described in the 
'docs/technical' file 
* @package Cache_Lite 
* @version $Id: Function.php,v 1.1 2004/07/21 
13:38:58 rcastley Exp $ 
* @author Sebastian BERGMANN 
* @author Fabien MARTY <> 
require_once($mosConfig_absolute_path . 
class Cache_Lite_Function extends Cache_Lite 
Simply add the following 2 lines before the 
require_once statement :  
/** ensure this file is being included by a parent 
file */ 
defined( '_VALID_MOS' ) or die( 'Direct Access to 
this location is not allowed.' ); 
The fix: 
The bugs are fixed in the CVS version. 
The information in this advisory and any of its 
demonstrations is provided 
"as is" without any warranty of any kind. 
I am not liable for any direct or indirect damages 
caused as a result of 
using the information or demonstrations 
provided in any part of this 
	Joxean Koret at 


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC