Vulnerability Description
PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla | <= 1.0.14 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29106
- http://securityreason.com/securityalert/4787
- http://www.joomla.org/announcements/release-news/4609-joomla-1015-released.htmlPatchVendor Advisory
- http://www.securityfocus.com/archive/1/488126/100/200/threaded
- http://www.securityfocus.com/archive/1/488199/100/200/threaded
- http://www.securityfocus.com/bid/27795
- http://secunia.com/advisories/29106
- http://securityreason.com/securityalert/4787
- http://www.joomla.org/announcements/release-news/4609-joomla-1015-released.htmlPatchVendor Advisory
- http://www.securityfocus.com/archive/1/488126/100/200/threaded
- http://www.securityfocus.com/archive/1/488199/100/200/threaded
- http://www.securityfocus.com/bid/27795
FAQ
What is CVE-2008-5671?
CVE-2008-5671 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a UR...
How severe is CVE-2008-5671?
CVE-2008-5671 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5671?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla.