PHP remote file inclusion vulnerability in archive.php in the mosListMessenger Component (com_lm) before 20060719 for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.phil-taylor.com/2006/08/09/information-on-moslistmessenger-security-hardening/ - | |
References | () http://forum.joomla.org/index.php?topic=86460.msg439766#msg439766 - | |
References | () http://secunia.com/advisories/21531 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/443356/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/3304 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28405 - |
Information
Published : 2006-08-18 20:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4229
Mitre link : CVE-2006-4229
CVE.ORG link : CVE-2006-4229
JSON object : View
Products Affected
joomla
- moslistmessenger_component
mambo
- moslistmessenger_component
CWE