CVE-2006-3750

PHP remote file inclusion vulnerability in server.php in the Hashcash Component (com_hashcash) 1.2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hashcash:hashcash:1.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:14

Type Values Removed Values Added
References () http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt - Exploit, Vendor Advisory () http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt - Exploit, Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2006-07/0180.html - Exploit () http://archives.neohapsis.com/archives/bugtraq/2006-07/0180.html - Exploit
References () http://secunia.com/advisories/21053 - Vendor Advisory () http://secunia.com/advisories/21053 - Vendor Advisory
References () http://securityreason.com/securityalert/1249 - () http://securityreason.com/securityalert/1249 -
References () http://www.vupen.com/english/advisories/2006/2802 - () http://www.vupen.com/english/advisories/2006/2802 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27720 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27720 -
References () https://www.exploit-db.com/exploits/2026 - () https://www.exploit-db.com/exploits/2026 -

Information

Published : 2006-07-21 14:03

Updated : 2024-11-21 00:14


NVD link : CVE-2006-3750

Mitre link : CVE-2006-3750

CVE.ORG link : CVE-2006-3750


JSON object : View

Products Affected

hashcash

  • hashcash
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')