joomla
- Author: vmiklos
- Vulnerable: 1.0.13-2sayshell1
- Unaffected: 1.0.15-1sayshell1
Hendrik-Jan Verheij has discovered a vulnerability in Joomla!, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the “mosConfig_absolute_path” parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from external resources. Successful exploitation requires that RG_EMULATION is either switched on or undefined. NOTE: Both situations cause security warnings to be displayed in Joomla!’s administration section.