Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) mosConfig_absolute_path parameter to (a) add_tmsp.php, (b) edit_tmsp.php and (c) tmsp.php in includes/tmsp/; and the (2) GLOBALS[mosConfig_absolute_path] parameter to (d) includes/tmsp/subscription.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Recly | Interactive Feederator | 1.0.5 |
| Joomla | Joomla | All versions |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/4827
- http://www.securityfocus.com/bid/32194Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46438
- https://www.exploit-db.com/exploits/7040
- http://securityreason.com/securityalert/4827
- http://www.securityfocus.com/bid/32194Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46438
- https://www.exploit-db.com/exploits/7040
FAQ
What is CVE-2008-5789?
CVE-2008-5789 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in th...
How severe is CVE-2008-5789?
CVE-2008-5789 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5789?
Check the references section above for vendor advisories and patch information. Affected products include: Recly Interactive Feederator, Joomla Joomla.