Korean
<< Back
VID 210114
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Mambo Open Source appears to be vulnerable to multiple vulnerabilities in the 'connector.php' script of the MOStlyCE component. Mambo Open Source (formerly Mambo Site Server) is an Internet portal and content management software. MOStlyContent Editor (MOStlyCE) is the default WYSIWYG editor for Mambo. MOStlyCE 2.4 included with Mambo 4.6.3 are vulnerable to multiple vulnerabilitie. These issues are caused by input validation errors in the "mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php" script when processing user-supplied data, which could be exploited by attackers to delete arbitrary files, gain knowledge of sensitive information, rename Mambo's configuration file, or cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.

* References:
http://archives.neohapsis.com/archives/bugtraq/2008-01/0386.html
http://www.milw0rm.com/exploits/4845
http://secunia.com/advisories/28670

* Platforms Affected:
Mamboserver, Mambo Open Source version 4.6.3 and earlier versions
Mambo MOStlyCE version 2.4 and possibly other versions
Any operating system Any version
Recommendation Upgrade to the latest version of MOStlyCE (3.0 or later), as listed in the Mambo Security Announcement at http://sourceforge.net/projects/mostlyce/

As a workaround, restrict access to the "mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php" script (e.g. with ".htaccess").
Related URL CVE-2008-7215 (CVE)
Related URL 27472 (SecurityFocus)
Related URL 39986 (ISS)