PHP remote file inclusion vulnerability in langset.php in J! Reactions (com_jreactions) 1.8.1 and earlier, a Joomla! component, allows remote attackers to execute arbitrary PHP code via a URL in the comPath parameter.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2984 - | |
References | () http://www.securityfocus.com/archive/1/475544/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/477144/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/477245/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/25198 - Exploit | |
References | () http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35808 - |
Information
Published : 2007-08-08 23:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4244
Mitre link : CVE-2007-4244
CVE.ORG link : CVE-2007-4244
JSON object : View
Products Affected
joomla
- j_reactions
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')