CVE-2006-4378

Multiple PHP remote file inclusion vulnerabilities in the Rssxt component for Joomla! (com_rssxt), possibly 2.0 Beta 1 or 1.0 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) pinger.php, (2) RPC.php, or (3) rssxt.php. NOTE: another researcher has disputed this issue, saying that the attacker can not control this parameter. In addition, as of 20060825, the original researcher has appeared to be unreliable with some other past reports. CVE has not performed any followup analysis with respect to this issue
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:joomla:rssxt_component:*:*:*:*:*:*:*:*
cpe:2.3:a:joomla:rssxt_component:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://securityreason.com/securityalert/1456 - () http://securityreason.com/securityalert/1456 -
References () http://www.osvdb.org/28096 - () http://www.osvdb.org/28096 -
References () http://www.securityfocus.com/archive/1/443628/100/100/threaded - () http://www.securityfocus.com/archive/1/443628/100/100/threaded -
References () http://www.securityfocus.com/archive/1/444058/100/100/threaded - () http://www.securityfocus.com/archive/1/444058/100/100/threaded -
References () http://www.securityfocus.com/bid/19593 - () http://www.securityfocus.com/bid/19593 -

07 Nov 2023, 01:59

Type Values Removed Values Added
Summary ** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in the Rssxt component for Joomla! (com_rssxt), possibly 2.0 Beta 1 or 1.0 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) pinger.php, (2) RPC.php, or (3) rssxt.php. NOTE: another researcher has disputed this issue, saying that the attacker can not control this parameter. In addition, as of 20060825, the original researcher has appeared to be unreliable with some other past reports. CVE has not performed any followup analysis with respect to this issue. Multiple PHP remote file inclusion vulnerabilities in the Rssxt component for Joomla! (com_rssxt), possibly 2.0 Beta 1 or 1.0 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) pinger.php, (2) RPC.php, or (3) rssxt.php. NOTE: another researcher has disputed this issue, saying that the attacker can not control this parameter. In addition, as of 20060825, the original researcher has appeared to be unreliable with some other past reports. CVE has not performed any followup analysis with respect to this issue

Information

Published : 2006-08-26 21:04

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4378

Mitre link : CVE-2006-4378

CVE.ORG link : CVE-2006-4378


JSON object : View

Products Affected

joomla

  • rssxt_component