title: CVE-2010-1494 Exploitation Attempt id: 4c7ff51e-47cb-4f89-8a1c-ec71be8d811a author: Subhash Popuri (@pbssubhash) date: 2021/08/25 status: experimental description: Joomla! Component AWDwall 1.5.4 - Local File Inclusion:Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. references: - https://github.com/projectdiscovery/nuclei-templates logsource: category: webserver detection: selection: c-uri|contains: - /index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00 condition: selection false_positives: - Scanning from Nuclei - Penetration Testing Activity - Unknown tags: - attack.initial_access - attack.t1190 level: critical