CVE-2009-2015

NUCLEI

Joomla! com_moofaq 1.0 - Path Traversal

Title source: llm

Description

Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Chip d3 bi0s · textwebappsphp
https://www.exploit-db.com/exploits/8898

Nuclei Templates (1)

Joomla! MooFAQ 1.0 - Local File Inclusion
HIGHby daffainfo

Scores

EPSS 0.0212
EPSS Percentile 84.2%

Details

CWE
CWE-22
Status published
Products (1)
ideal/com_moofaq 1.0
Published Jun 09, 2009
Tracked Since Feb 18, 2026