PHP remote file inclusion vulnerability in jambook.php in the Jambook (com_Jambook) 1.0 beta7 module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by a reliable third party because the jambook.php protects against direct request
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2007-April/001535.html - | |
References | () http://securityreason.com/securityalert/2603 - | |
References | () http://www.jxdevelopment.com/ - | |
References | () http://www.osvdb.org/34151 - | |
References | () http://www.securityfocus.com/archive/1/465843/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/23509 - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | PHP remote file inclusion vulnerability in jambook.php in the Jambook (com_Jambook) 1.0 beta7 module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by a reliable third party because the jambook.php protects against direct request |
Information
Published : 2007-04-24 17:19
Updated : 2024-11-21 00:30
NVD link : CVE-2007-2196
Mitre link : CVE-2007-2196
CVE.ORG link : CVE-2007-2196
JSON object : View
Products Affected
joomla
- jambook
mambo
- jambook
CWE