CVE-2009-4789

Published Apr 21, 2010

Last updated 14 years ago

Overview

Description
Multiple PHP remote file inclusion vulnerabilities in the MojoBlog component RC 0.15 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) wp-comments-post.php and (2) wp-trackback.php.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-94

Social media

Hype score
Not currently trending

Evaluator

Comment
-
Impact
Per http://extensions.joomla.org/extensions/3374/details: Editor's note This extension has been unpublished for the following reason: * This extension is not compatible with Joomla! 1.5
Solution
Per http://extensions.joomla.org/extensions/3374/details: Editor's note This extension has been unpublished for the following reason: * This extension is not compatible with Joomla! 1.5

Configurations