Описание
Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
Ссылки
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.05015
Низкий
7.5 High
CVSS2
Дефекты
CWE-22
Связанные уязвимости
github
почти 4 года назад
Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 89%
0.05015
Низкий
7.5 High
CVSS2
Дефекты
CWE-22