Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) mosConfig_absolute_path parameter to (a) add_tmsp.php, (b) edit_tmsp.php and (c) tmsp.php in includes/tmsp/; and the (2) GLOBALS[mosConfig_absolute_path] parameter to (d) includes/tmsp/subscription.php.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2008-12-31 03:30
Updated : 2017-09-28 18:32
NVD link : CVE-2008-5789
Mitre link : CVE-2008-5789
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
recly
- interactive_feederator
joomla
- joomla