Vulnerability Description
Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roberto Aloi | Com Joomlapicasa2 | 2.0.0 |
| Joomla | Joomla\! | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/1004-exploits/joomlapicasa-lfi.txtExploit
- http://secunia.com/advisories/39338Vendor Advisory
- http://www.exploit-db.com/exploits/12058Exploit
- http://www.securityfocus.com/bid/39200Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57508
- http://packetstormsecurity.org/1004-exploits/joomlapicasa-lfi.txtExploit
- http://secunia.com/advisories/39338Vendor Advisory
- http://www.exploit-db.com/exploits/12058Exploit
- http://www.securityfocus.com/bid/39200Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57508
FAQ
What is CVE-2010-1306?
CVE-2010-1306 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller param...
How severe is CVE-2010-1306?
CVE-2010-1306 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1306?
Check the references section above for vendor advisories and patch information. Affected products include: Roberto Aloi Com Joomlapicasa2, Joomla Joomla\!.