CVE-2006-4074
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
11/08/2006
Last modified:
03/04/2025
Description
PHP remote file inclusion vulnerability in lib/tpl/default/main.php in the JD-Wiki Component (com_jd-wiki) 1.0.2 and earlier for Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:joomla:jd-wiki:*:*:*:*:*:*:*:* | 1.0.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/21389
- http://www.joomladeveloping.org/component/option%2Ccom_jd-wp/Itemid%2C29/p%2C33/
- http://www.securityfocus.com/bid/19373
- http://www.vupen.com/english/advisories/2006/3192
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28253
- https://www.exploit-db.com/exploits/2125
- http://secunia.com/advisories/21389
- http://www.joomladeveloping.org/component/option%2Ccom_jd-wp/Itemid%2C29/p%2C33/
- http://www.securityfocus.com/bid/19373
- http://www.vupen.com/english/advisories/2006/3192
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28253
- https://www.exploit-db.com/exploits/2125



