.. / CVE-2009-2015

Exploit for Joomla! MooFAQ 1.0 - Local File Inclusion (CVE-2009-2015)

Description:

Joomla! Ideal MooFAQ 1.0 via com_moofaq allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter (local file inclusion).

Nuclei Template

View the template here CVE-2009-2015.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2009/CVE-2009-2015.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2009-2015
https://github.com/ARPSyndicate/kenzer-templates
https://www.exploit-db.com/exploits/8898
http://www.vupen.com/english/advisories/2009/1530