vendor:
com_realtyna
by:
AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ]
7,5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: com_realtyna
Affected Version From: 1.0.15
Affected Version To: 1.0.15
Patch Exists: Yes
Related CWE: N/A
CPE: a:realtyna:com_realtyna:1.0.15
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Joomla
2010
Joomla Component Realtyna Translator Local File Inclusion Vulnerability
A Local File Inclusion (LFI) vulnerability exists in the com_realtyna version 1.0.15 component for Joomla. An attacker can exploit this vulnerability to include arbitrary files from the web server, which can lead to the disclosure of sensitive information. The vulnerability is due to insufficient sanitization of user-supplied input to the 'controller' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request containing directory traversal characters (e.g. '../') to the vulnerable script. Successful exploitation of this vulnerability can result in the disclosure of sensitive information.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of the software.