Vulnerability CVE-2006-4130


Published: 2006-08-14   Modified: 2012-02-12

Description:
PHP remote file inclusion vulnerability in admin.remository.php in the Remository Component (com_remository) 3.25 and earlier for Mambo and Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
Mambo/Joomla Component Remository v3.25 (mosConfig_absolute_path) Remote File Inclusion Vulnerability
camino
15.08.2006

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Matt smith -> Remository for mambo 

 References:
http://securityreason.com/securityalert/1379
http://www.remository.com/component/option,com_mamboboard/func,view/catid,6/id,3666/#3666
http://www.remository.com/rem/Remository/Download/Mambo-Software/ReMOSitory-components/Remository-3.26/
http://www.securityfocus.com/archive/1/442869/100/0/threaded
http://www.securityfocus.com/bid/19465
http://www.vupen.com/english/advisories/2006/3270
https://exchange.xforce.ibmcloud.com/vulnerabilities/28330

Copyright 2024, cxsecurity.com

 

Back to Top