CVE-2009-3822
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
28/10/2009
Last modified:
09/04/2025
Description
PHP remote file inclusion vulnerability in Fiji Web Design Ajax Chat (com_ajaxchat) component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter to tests/ajcuser.php.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:fijiwebdesign:com_ajaxchat:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/37087
- http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt
- http://www.securityfocus.com/bid/36731
- http://www.vupen.com/english/advisories/2009/2968
- http://secunia.com/advisories/37087
- http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt
- http://www.securityfocus.com/bid/36731
- http://www.vupen.com/english/advisories/2009/2968



