vendor:
obSuggest
by:
v3n0m
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: obSuggest
Affected Version From: 1.5.x
Affected Version To: 1.5.x
Patch Exists: YES
Related CWE: N/A
CPE: a:foobla:obsuggest
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Joomla
2011
Joomla Component obSuggest Local File Inclusion Vulnerability
Joomla Component obSuggest is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability to include local files on the server, which can lead to the disclosure of sensitive information. This vulnerability is due to insufficient sanitization of user-supplied input to the 'controller' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters to the vulnerable script. Successful exploitation of this vulnerability can result in the disclosure of sensitive information.
Mitigation:
Upgrade to the latest version of Joomla Component obSuggest. Ensure that user-supplied input is properly sanitized before being used in the application.