Joomla! Dailymeals Component "controller" Local File Inclusion Vulnerability

SECUNIA ADVISORY ID:
SA38014

VERIFY ADVISORY:
http://secunia.com/advisories/38014/

DESCRIPTION:
A vulnerability has been discovered in the Dailymeals component for
Joomla!, which can be exploited by malicious people to disclose
potentially sensitive information.

Input passed to the "controller" parameter in index.php (if "option"
is set to "com_dailymeals" and "view" is set to "dailymeals") is not
properly verified before being used to include files. This can be
exploited to include arbitrary files from local resources via
directory traversal attacks.

The vulnerability is confirmed in version 1.0. Other versions may
also be affected.

SOLUTION:
Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY:
FL0RiX

ORIGINAL ADVISORY:
http://www.exploit-db.com/exploits/10928

RECENT ARTICLE

RECENT POST