Security for everyone

CVE-2010-1723 Scanner

Detects 'Directory Traversal' vulnerability in iNetLanka Contact Us Draw Root Map component for Joomla! affects v. 1.1.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




The iNetLanka Contact Us Draw Root Map component for Joomla! is designed to provide website administrators with an easy way to create and display a visual representation of the website's directory structure. It is typically used on Joomla! websites that have a large number of pages or complex directory structures. The component's functionality allows users to draw and display the website's directory structure as a tree or graph, which can help improve site navigation and information architecture.

One of the vulnerabilities detected in this product is CVE-2010-1723. This vulnerability is a directory traversal vulnerability that allows remote attackers to read arbitrary files on the server. The vulnerability is caused by the component's failure to properly validate user input when processing requests for files and directories. An attacker can exploit this vulnerability by injecting a ".." sequence into the controller parameter to reach files that are not intended to be accessible to them.

When this vulnerability is exploited, it can lead to serious consequences for website owners and their users. An attacker can use the vulnerability to gain sensitive information, such as user passwords or data stored in configuration files. They could also upload malicious scripts and execute commands remotely, effectively compromising the entire website. This could lead to loss of data, financial damage, and reputational harm.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. By using the platform's comprehensive scan and analysis tools, website owners can identify vulnerabilities and take appropriate measures to address them. The platform also offers advanced reporting and insights, making it easier to stay on top of emerging threats and protect against future attacks. Don't wait until it's too late – sign up for today and keep your digital assets safe and secure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture