title: CVE-2010-1657 Exploitation Attempt id: e218a3bd-5583-4737-a993-60c14a6839a8 author: Subhash Popuri (@pbssubhash) date: 2021/08/25 status: experimental description: Joomla! Component SmartSite 1.0.0 - Local File Inclusion:Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. references: - https://github.com/projectdiscovery/nuclei-templates logsource: category: webserver detection: selection: c-uri|contains: - /index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00 condition: selection false_positives: - Scanning from Nuclei - Penetration Testing Activity - Unknown tags: - attack.initial_access - attack.t1190 level: critical