CVE-2007-4187
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
08/08/2007
Last modified:
09/04/2025
Description
Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:joomla:joomla:1.5.0_beta:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=/development/trunk/components/com_search/views/search/view.php&r1=7455&r2=7456
- http://osvdb.org/41260
- http://securityreason.com/securityalert/2969
- http://www.securityfocus.com/archive/1/474417/100/100/threaded
- http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=/development/trunk/components/com_search/views/search/view.php&r1=7455&r2=7456
- http://osvdb.org/41260
- http://securityreason.com/securityalert/2969
- http://www.securityfocus.com/archive/1/474417/100/100/threaded