Summary
The JoomTouch component for Joomla! is prone to a local file- include vulnerability because it fails to properly sanitize user- supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer
other attacks are
also possible.
JoomTouch 1.0.2 is affected
other versions may also be vulnerable.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- AjaXplorer 'doc_file' Parameter Local File Disclosure Vulnerability
- Apache Tomcat cal2.jsp Cross Site Scripting Vulnerability
- Apache Struts2 showcase namespace XSS Vulnerability
- Apache Struts Showcase Multiple Persistence Cross-Site Scripting Vulnerabilities