Short Name |
HTTP:PHP:MAMBO-PATH-INCL |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Mambo Path Inclusion |
Release Date |
2005/12/05 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Mambo, an online publishing application. Mambo 4.5.2 and prior versions are vulnerable. Attackers can send a malicious HTTP request to the Mambo Web server to cause arbitrary code execution.
Mambo is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access. Update: Reportedly, this issue is being actively exploited in the wild; multiple Web sites have been defaced, and the issue described in this BID is being cited as the attackers method of entry. Update 12/5/2005 - Reports indicate that a bot is propagating in the wild by exploiting this vulnerability.