joomla

Page content
  • Author: vmiklos
  • Vulnerable: 1.0.13-2sayshell1
  • Unaffected: 1.0.15-1sayshell1

Hendrik-Jan Verheij has discovered a vulnerability in Joomla!, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the “mosConfig_absolute_path” parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from external resources. Successful exploitation requires that RG_EMULATION is either switched on or undefined. NOTE: Both situations cause security warnings to be displayed in Joomla!’s administration section.

CVEs:

  • There is no CVE entry for this issue.