Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-0696 PoC — Joomlaworks Joomla! Jw_allVideos插件目录遍历漏洞

Source
Associated Vulnerability
Title:Joomlaworks Joomla! Jw_allVideos插件目录遍历漏洞 (CVE-2010-0696)
Description:Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla!的 JoomlaWorks AllVideos (Jw_allVideos)插件存在目录遍历漏洞。远程攻击者可以借助file参数的./../.../目录遍历符,读取任意的文件。
Description
A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.
File Snapshot

id: CVE-2010-0696 info: name: Joomla! Component Jw_allVideos - Arbitrary File Retrieval author: ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.