Vulnerability CVE-2008-5671


Published: 2008-12-18   Modified: 2012-02-12

Description:
PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
Joomla 1.0.13 - 1.0.14 / (remote) PHP file inclusion possible if old configuration.php
Hendrik Jan Verh...
22.12.2008

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

Vendor: Joomla
Product: Joomla 
Version:
1.0.14
1.0.13
1.0.12
1.0.11

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.joomla.org/announcements/release-news/4609-joomla-1015-released.html
http://www.securityfocus.com/bid/27795
http://www.securityfocus.com/archive/1/archive/1/488199/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/488126/100/200/threaded
http://securityreason.com/securityalert/4787
http://secunia.com/advisories/29106

Related CVE
CVE-2018-6378
In Joomla! Core before 3.8.8, inadequate filtering of file and folder names leads to various XSS attack vectors in the media manager.
CVE-2018-11328
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could...
CVE-2018-11327
An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission.
CVE-2018-11326
An issue was discovered in Joomla! Core before 3.8.8. Inadequate input filtering leads to a multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a ...
CVE-2018-11325
An issue was discovered in Joomla! Core before 3.8.8. The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and display the plaintext password for the administrator a...
CVE-2018-11324
An issue was discovered in Joomla! Core before 3.8.8. A long running background process, such as remote checks for core or extension updates, could create a race condition where a session that was expected to be destroyed would be recreated.
CVE-2018-11323
An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to modify the access levels of user groups with higher permissions.
CVE-2018-11322
An issue was discovered in Joomla! Core before 3.8.8. Depending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.

Copyright 2018, cxsecurity.com

 

Back to Top