.. / CVE-2008-6172

Exploit for Joomla! Component RWCards 3.0.11 - Local File Inclusion (CVE-2008-6172)

Description:

A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.

Nuclei Template

View the template here CVE-2008-6172.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2008/CVE-2008-6172.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2008-6172
https://github.com/ARPSyndicate/kenzer-templates
https://www.exploit-db.com/exploits/6817
https://exchange.xforce.ibmcloud.com/vulnerabilities/46081