# Exploit Title: Joomla Simple File Lister module <= 1.0 Directory Traversal Vulnerability# Google Dork: "Simple File Lister v1.0" "Files in directory" |
function getDirContents($params, $sfl_dirlocation, $sfl_basepath, $sfl_maxfiles, $sfl_userlocation) { |
really messy code, generally speaking the variable $sfl_dirlocation which contains the directory to be |
read is not succesfully sanitized for relative paths |
To look for a valid url, just sniff the HTTP request sent from the module javascript code once a directory is clicked.
Al momento non è stata pubblicata una patch correttiva, si consiglia di visitare il sito dello sviluppatore dell'estensione.