Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1540 PoC — Myblog 'com_myblog'组件'task'参数本地文件包含漏洞

Source
Associated Vulnerability
Title:Myblog 'com_myblog'组件'task'参数本地文件包含漏洞 (CVE-2010-1540)
Description:Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla! MyBlog(com_myblog)组件的index.php存在目录遍历漏洞,远程攻击者可以通过task参数的".."符读取任意文件。
Description
A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.
File Snapshot

id: CVE-2010-1540 info: name: Joomla! Component com_blog - Directory Traversal author: daffainf ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.