Advisory #: 75
Title: Mambo CMS vulnerabilities
Author: Larry W. Cashdollar, @_larry0
Date: 2012-01-02
CWE: CWE-255 Credentials Management
Download Site:
Vendor Notified: 2012-01-02
Vendor Contact:
Description: Mambo is a full-featured content management system that can be used for everything from simple websites to complex corporate applications.
Clear text password/crypt: Mambo stores mysql database password in clear text in the documentroot path. (default recommendation is to use root credentials) which is readable by any local user. Mambo also stores the admin password hash which is readable by any local user. from documentation: CHMOD configuration.php to 777 Additional Notes on CHMOD [Permissions] For additional security return configuration.php to CHMOD 644 after making changes. 2. DoS An attacker doesn't have to be authenticated to start the process of uploading a file. The file won't be saved as authentication is required, but memory and bandwidth are consumed. http://<target ip>/mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/frmupload.html 3. path disclosure There appears to be broken php scripts installed with the package: http://<target ip>/mambots/editors/mostlyce/jscripts/tiny_mce/imagemanager/thumbs.php & editorFrame.php editor.php images.php manager.php are all busted and return Warning: require(/var/wwwmambots/editors/mostlyce/jscripts/tiny_mce/auth_check.php) [function.require]: failed to open stream: No such file or directory in /var/www/mambots/editors/mostlyce/jscripts/tiny_mce/imagemanager/editorFrame.php on line 4 Fatal error: require() [function.require]: Failed opening required '/var/wwwmambots/editors/mostlyce/jscripts/tiny_mce/auth_check.php' (include_path='.:/usr/share/php:/usr/share/pear') in /var/www/mambots/editors/mostlyce/jscripts/tiny_mce/imagemanager/editorFrame.php on line 4
Exploit Code:
Screen Shots:
91552 91551 91553 78219