.. / CVE-2010-0696

Exploit for Joomla! Component Jw_allVideos - Arbitrary File Retrieval (CVE-2010-0696)

Description:

A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../…/ (modified dot dot) in the file parameter.

Nuclei Template

View the template here CVE-2010-0696.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2010/CVE-2010-0696.yaml
Copy

References:

http://www.exploit-db.com/exploits/11447
http://www.joomlaworks.gr/content/view/77/34/
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2010-0696
https://www.exploit-db.com/exploits/11447