6.5
CVSSv2

CVE-2018-12712

Published: 26/06/2018 Updated: 20/08/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in Joomla! 2.5.0 up to and including 3.8.8 prior to 3.8.9. The autoload code checks classnames to be valid, using the "class_exists" function in PHP. In PHP 5.3, this function validates invalid names as valid, which can result in a Local File Inclusion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

joomla joomla\\!

Github Repositories

HTB easy machine

Curling Walkthrough (HackTheBox) by yag1n3 objetives user flag root flag Reconnaissance nmap website we see that it's using Joomla thanks to Wappalizer let's check the source code omg someone has to be fired we access that endpoint, there is a string that looks like base64 we decode it and it surely looks like a password on the posts posted on the root of t