First published: Tue Mar 02 2010(Updated: )
Directory traversal vulnerability in the AutartiTarot (com_autartitarot) component 1.0.3 for Joomla! allows remote authenticated users, with "Public Back-end" group permissions, to read arbitrary files via directory traversal sequences in the controller parameter in an edit task to administrator/index.php. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Autartica Com Autartitarot | =1.0.3 | |
Joomla Joomla\! |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.