Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1314 PoC — Joomla! 'Highslide JS'目录遍历漏洞

Source
Associated Vulnerability
Title:Joomla! 'Highslide JS'目录遍历漏洞 (CVE-2010-1314)
Description:Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla!的脚本的Highslide JS (com_hsconfig)组件存在目录遍历漏洞。由于没有充分过滤脚本index.php的controller参数,远程攻击者可以借助该参数中的“..”,读取任意的本地文件。
Description
A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
File Snapshot

id: CVE-2010-1314 info: name: Joomla! Component Highslide 1.5 - Local File Inclusion author: da ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.