Vulnerability Description
PHP remote file inclusion vulnerability in mamboleto.php in the Fernando Soares Mamboleto (com_mamboleto) component 2.0 RC3 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fernando Soares | Com Mamboleto | 2.0 |
| Joomla | Joomla | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/0912-exploits/joomlamamboleto-rfi.txtExploit
- http://www.exploit-db.com/exploits/10369Exploit
- http://www.securityfocus.com/bid/37280Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54662
- http://packetstormsecurity.org/0912-exploits/joomlamamboleto-rfi.txtExploit
- http://www.exploit-db.com/exploits/10369Exploit
- http://www.securityfocus.com/bid/37280Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54662
FAQ
What is CVE-2009-4604?
CVE-2009-4604 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in mamboleto.php in the Fernando Soares Mamboleto (com_mamboleto) component 2.0 RC3 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL ...
How severe is CVE-2009-4604?
CVE-2009-4604 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4604?
Check the references section above for vendor advisories and patch information. Affected products include: Fernando Soares Com Mamboleto, Joomla Joomla.