# Exploit Title: Joomla component com_oziogallery2 / IMAGIN arbitrary file write# Date: 01-01-10# Author: Ubik and er# Software Link: oziogallery.joomla.it / imagin.ro# Version: all# Disclaimer : all the information in this document is provided "as is", for educational purposes only. The authors will not be responsible for any damage.
technical information
---------------------
We can find this obviously flawed code in/scripts_ralcr/filesystem/writeToFile.php:*************************
$file="../../".$_POST["path"];
$fh = fopen ($file,'w')or die("error::Can't open file for writing");
echo fwrite ($fh, stripslashes($_POST["raw_data"]));
fclose($fh);*************************
An attack can be easily performed by manipulating the parameters (path and raw_data).
Probably other php files in scripts_ralcr are coded without any care about security.
In Oziogallery the vulnerable files are located in/components/com_oziogallery2/imagin/scripts_ralcr/.