Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7p5g-hr77-f36q

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

EPSS

Процентиль: 27%
0.00095
Низкий

Дефекты

CWE-94

Связанные уязвимости

nvd
около 17 лет назад

PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

EPSS

Процентиль: 27%
0.00095
Низкий

Дефекты

CWE-94