PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path parameter.
References
Link | Resource |
---|---|
http://www.kamtiez.org/2009/11/joomla-mambo-component-comezine-remote.html | Exploit URL Repurposed |
http://www.securityfocus.com/bid/37043 | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54307 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2009-11-27T20:45:00
Updated: 2017-08-16T14:57:01
Reserved: 2009-11-27T00:00:00
Link: CVE-2009-4094
JSON object: View
NVD Information
Status : Modified
Published: 2009-11-29T13:07:34.983
Modified: 2024-02-14T01:17:43.863
Link: CVE-2009-4094
JSON object: View
Redhat Information
No data.
CWE