CVE-2010-2920
Joomla! Component Foobla Suggestions 1.5.1.2 - Local File Inclusion
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Directory traversal vulnerability in the Foobla Suggestions (com_foobla_suggestions) component 1.5.1.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
Vulnerabilidad de salto de directorio en el componente Foobla Suggestions (com_foobla_suggestions) v1.5.1.2 de Joomla! permite a atacantes remotos leer archivos de su elección a través de secuencias de salto de directorio en el parámetro "controller" de index.php.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-04-09 First Exploit
- 2010-07-30 CVE Reserved
- 2010-07-30 CVE Published
- 2023-05-09 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/57660 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/12120 | 2010-04-09 | |
http://packetstormsecurity.org/1004-exploits/joomlafoobla-lfi.txt | 2024-08-07 | |
http://www.exploit-db.com/exploits/12120 | 2024-08-07 | |
http://www.securityfocus.com/bid/39341 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.vupen.com/english/advisories/2010/1844 | 2017-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Foobla Search vendor "Foobla" | Com Foobla Suggestions Search vendor "Foobla" for product "Com Foobla Suggestions" | 1.5.1.2 Search vendor "Foobla" for product "Com Foobla Suggestions" and version "1.5.1.2" | - |
Affected
| in | Joomla Search vendor "Joomla" | Joomla\! Search vendor "Joomla" for product "Joomla\!" | * | - |
Safe
|