CVE-2006-4378
Published Aug 26, 2006
Last updated 3 months ago
Overview
- Description
- Multiple PHP remote file inclusion vulnerabilities in the Rssxt component for Joomla! (com_rssxt), possibly 2.0 Beta 1 or 1.0 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) pinger.php, (2) RPC.php, or (3) rssxt.php. NOTE: another researcher has disputed this issue, saying that the attacker can not control this parameter. In addition, as of 20060825, the original researcher has appeared to be unreliable with some other past reports. CVE has not performed any followup analysis with respect to this issue
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:joomla:rssxt_component:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDB453C-598C-46B5-9A58-EF3B7AF55B79", "versionEndIncluding": "2.0_beta_1" }, { "criteria": "cpe:2.3:a:joomla:rssxt_component:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "403550AF-3773-4C5A-92C4-74C091C65FFE" } ], "operator": "OR" } ] } ]