Vulnerability Description
Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomlanook | Com Hsconfig | 1.5 |
| Joomla | Joomla\! | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txtExploit
- http://secunia.com/advisories/39359Vendor Advisory
- http://www.exploit-db.com/exploits/12086Exploit
- http://www.securityfocus.com/bid/39239Exploit
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txtExploit
- http://secunia.com/advisories/39359Vendor Advisory
- http://www.exploit-db.com/exploits/12086Exploit
- http://www.securityfocus.com/bid/39239Exploit
FAQ
What is CVE-2010-1314?
CVE-2010-1314 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter ...
How severe is CVE-2010-1314?
CVE-2010-1314 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1314?
Check the references section above for vendor advisories and patch information. Affected products include: Joomlanook Com Hsconfig, Joomla Joomla\!.