VID |
210114 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Mambo Open Source appears to be vulnerable to multiple vulnerabilities in the 'connector.php' script of the MOStlyCE component. Mambo Open Source (formerly Mambo Site Server) is an Internet portal and content management software. MOStlyContent Editor (MOStlyCE) is the default WYSIWYG editor for Mambo. MOStlyCE 2.4 included with Mambo 4.6.3 are vulnerable to multiple vulnerabilitie. These issues are caused by input validation errors in the "mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php" script when processing user-supplied data, which could be exploited by attackers to delete arbitrary files, gain knowledge of sensitive information, rename Mambo's configuration file, or cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
* References: http://archives.neohapsis.com/archives/bugtraq/2008-01/0386.html http://www.milw0rm.com/exploits/4845 http://secunia.com/advisories/28670
* Platforms Affected: Mamboserver, Mambo Open Source version 4.6.3 and earlier versions Mambo MOStlyCE version 2.4 and possibly other versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of MOStlyCE (3.0 or later), as listed in the Mambo Security Announcement at http://sourceforge.net/projects/mostlyce/
As a workaround, restrict access to the "mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php" script (e.g. with ".htaccess"). |
Related URL |
CVE-2008-7215 (CVE) |
Related URL |
27472 (SecurityFocus) |
Related URL |
39986 (ISS) |
|