Multiple PHP remote file inclusion vulnerabilities in the Taskhopper 1.1 component for Mambo and Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) contact_type.php, (2) itemstatus_type.php, (3) projectstatus_type.php, (4) request_type.php, (5) responses_type.php, (6) timelog_type.php, or (7) urgency_type.php in inc/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2007-April/001504.html - | |
References | () http://www.osvdb.org/34795 - | |
References | () http://www.osvdb.org/34796 - | |
References | () http://www.osvdb.org/34797 - | |
References | () http://www.osvdb.org/34798 - | |
References | () http://www.osvdb.org/34799 - | |
References | () http://www.osvdb.org/34800 - | |
References | () http://www.osvdb.org/34801 - | |
References | () http://www.securityfocus.com/bid/23408 - | |
References | () http://www.vupen.com/english/advisories/2007/1346 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33552 - | |
References | () https://www.exploit-db.com/exploits/3703 - |
Information
Published : 2007-04-12 19:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2005
Mitre link : CVE-2007-2005
CVE.ORG link : CVE-2007-2005
JSON object : View
Products Affected
joomla
- taskhopper_component
mambo
- taskhopper_component
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')