Page 1 of 1

[PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Sat Jul 29, 2006 1:50 am
by Elpie
Remote file inclusion vulnerability.
JD-WordPress for Joomla is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Version 2.0-1.0 RC2 is vulnerable to these issues; prior versions may also be affected.
The developer has been notified.

Re: JD-WordPress Vulnerability

Posted: Sat Jul 29, 2006 9:38 am
by Predator
Thanks Elpie and as i told i have probs to reproduce this, maybe RobS can check this, and if why i have probs to reproduce this, thanks in Advance.

Re: JD-WordPress Vulnerability

Posted: Mon Jul 31, 2006 4:05 am
by dsendecki
Has there been any headway made with uncovering this vulnerability? This has me greatly concerned!

Re: JD-WordPress Vulnerability

Posted: Mon Jul 31, 2006 4:51 am
by Elpie
The exploits that have been published both appear to rely on register_globals being on. If you have register_globals off and are not running globals emulation 1 (globals.php in Joomla) you should be fine.
While I personally wouldnt use htaccess to block attempts, RobS's htaccess will also block any attempts to exploit JD-Wordpress.

Re: JD-WordPress Vulnerability

Posted: Mon Jul 31, 2006 8:32 am
by RobS
Joomla!'s RG emulation is probably safe as it does a fair job of sanitizing input but I haven't thouroughly tested it myself, just browed through it a bit.

Re: JD-WordPress Vulnerability

Posted: Mon Jul 31, 2006 3:26 pm
by Predator
Well have tested now during the weekend local with RG on and allow_furl on together with Joomla! 1.0.10 also on a webhosting of a friend with Rg on and allow_furl on and joomla! 1.0.10 and could not reproduce this but to avoid any constellation which may allow this i have made a patch where i replaced the call

require_once( $mosConfig_absolute_path .'/components/com_jd-wp/wp-config.php' );

into

require(dirname(__FILE__) . '/wp-config.php');

to be sure.

If you normally have Rg off you should be save, as i was even with On not able to hack it with Joomla! 1.0.10

Re: JD-WordPress Vulnerability

Posted: Tue Aug 01, 2006 6:59 am
by RobS
Also added to the list with a link to your patch.

Re: JD-WordPress Vulnerability

Posted: Thu Aug 03, 2006 1:20 am
by Vish
Marco

I must say, you have done a gr8 job with this component.

Re: JD-WordPress Vulnerability

Posted: Thu Aug 03, 2006 1:38 am
by Predator
Vish wrote: Marco

I must say, you have done a gr8 job with this component.
Thanks Vish  8)

will added the next day the use of the permalink with joomla so jd-wp will have than also long URLs :D the way the original WP has it. Is a customjob but i can release the code than to the comunity so everybody can use it ;)

Re: JD-WordPress Vulnerability

Posted: Sat Aug 05, 2006 3:00 am
by cmyksteve
RobS wrote: Also added to the list with a link to your patch.
Hi RobS,

I ran across your notice that JD-WordPress was on the Security Risk list, but I don't see the link to the patch you mention here. Please point me to it.

Thanks,
Steve

Re: JD-WordPress Vulnerability

Posted: Sat Aug 05, 2006 6:55 am
by Predator
cmyksteve wrote:
RobS wrote: Also added to the list with a link to your patch.
Hi RobS,

I ran across your notice that JD-WordPress was on the Security Risk list, but I don't see the link to the patch you mention here. Please point me to it.

Thanks,
Steve
See the attachment in Reply #5 in this Thread ;)

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Thu Aug 17, 2006 12:10 pm
by duvien
I've just patched JD-WP and the commenting system failed to work afterwards. But soon i realised there was a typo error on line 64:

elseif ( !is_email($comment_author_email))

should have been:

elseif ( !is_wp_email($comment_author_email))

Nothing major and apart from that everything else went smoothly. Thanks for the security patch :)

P.S. i have attached the patch here to inlcude the line above and nothing else.

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Thu Aug 17, 2006 12:16 pm
by Predator
Opps sorry my fault  :-[

Thanks duvien for correcting this ;)

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Wed Oct 24, 2007 7:21 pm
by Samleo
Hi, Where download the JD-Wordpress??

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Thu Dec 20, 2007 4:42 pm
by karryberry
what plugins are you using with the wordpress ap?

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Thu Dec 20, 2007 5:19 pm
by cmyksteve
JD-WordPress is no longer supported.
But a fork of this Joomla component called mojoBlog can be found on Joomlify.com

mojoBlog is still in beta, running under Joomla 1.0.13

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Mon Feb 25, 2008 12:01 am
by panter011
Hello it seams that the joomlify.com site is down.
where else can I have this mojoblog component?
thanks
Javier

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Mon Feb 25, 2008 3:20 pm
by NateM
I am also among the number of people who can't access the joomlify site. Anyone know what went down? It was fine a few days ago.

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Mon Feb 25, 2008 4:37 pm
by cmyksteve
NateM wrote:... Anyone know what went down? It was fine a few days ago.
I'm sure Kevin will have Joomlify.com back up soon. The datacenter was having some issues but it looked like those were being addressed last week. I don't know what this current blackout was caused by, but waiting on files directly from Joomlify.com would be the best place to get current versions of mojoBlog (beta 0.16).

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Mon Feb 25, 2008 6:34 pm
by panter011
ok, hope it will be soon, thank you!
anyway do you know any alternative download page?
thanks
Javier

Re: [PATCH AVAIL.] JD-WordPress Vulnerability

Posted: Tue Feb 26, 2008 12:55 am
by cmyksteve
Joomlify.com is back up.
Here's a link to the current version of mojoBlog from the download area-
http://www.joomlify.com/component/optio ... Itemid,53/