Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6vfv-v5v8-qx7q

Опубликовано: 05 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files

A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files

EPSS

Процентиль: 29%
0.00103
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-35

Связанные уязвимости

CVSS3: 5.4
nvd
8 месяцев назад

A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files

EPSS

Процентиль: 29%
0.00103
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-35