Lucene search

K
exploitdbDrosophilaEDB-ID:34250
HistoryJul 05, 2010 - 12:00 a.m.

Joomla! Component Canteen 1.0 - Local File Inclusion

2010-07-0500:00:00
Drosophila
www.exploit-db.com
21

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/41358/info

The Miniwork Studio Canteen component for Joomla! is prone to an SQL-injection vulnerability and a local file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Attackers can exploit the SQL-injection vulnerability to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute arbitrary local files within the context of the webserver process. Information harvested may aid in further attacks.

Canteen 1.0 is vulnerable; other versions may also be affected.

http://www.example.com/index.php?option=com_canteen&controller=../../../../../etc/passwd%00 

AI Score

7.4

Confidence

Low

Related for EDB-ID:34250