Vulnerability Description
Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla | 1.5.0_beta |
Related Weaknesses (CWE)
References
- http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopmen
- http://osvdb.org/41260
- http://securityreason.com/securityalert/2969
- http://www.securityfocus.com/archive/1/474417/100/100/threaded
- http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopmen
- http://osvdb.org/41260
- http://securityreason.com/securityalert/2969
- http://www.securityfocus.com/archive/1/474417/100/100/threaded
FAQ
What is CVE-2007-4187?
CVE-2007-4187 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword ...
How severe is CVE-2007-4187?
CVE-2007-4187 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4187?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla.