Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43913/ | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43913/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43913/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-01-29 05:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-6008
Mitre link : CVE-2018-6008
CVE.ORG link : CVE-2018-6008
JSON object : View
Products Affected
joomlatag
- jtag_members_directory
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor