Multiple PHP remote file inclusion vulnerabilities in the Clickheat - Heatmap stats (com_clickheat) component 1.0.1 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) install.clickheat.php, (b) Cache.php and (c) Clickheat_Heatmap.php in Recly/Clickheat/, and (d) Recly/common/GlobalVariables.php; and the (2) mosConfig_absolute_path parameter to (e) _main.php and (f) main.php in includes/heatmap, and (g) includes/overview/main.php.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4841 - | |
References | () http://www.securityfocus.com/bid/32190 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46439 - | |
References | () https://www.exploit-db.com/exploits/7038 - |
Information
Published : 2008-12-31 11:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5793
Mitre link : CVE-2008-5793
CVE.ORG link : CVE-2008-5793
JSON object : View
Products Affected
recly
- clickheat-heatmap
joomla
- joomla
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')