VID |
210074 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Joomla! program is vulnerable to a command execution vulnerability via the 'searchword' parameter. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.5 RC1 could allow a remote attacker to execute arbitrary commands on the system, caused by multiple eval injection vulnerabilities in the com_search component. By sending a specially-crafted URL request using the searchword parameter, a remote attacker could execute arbitrary PHP code on the affected host with the privileges of the web server.
* References: http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopment%2Ftrunk%2Fcomponents%2Fcom_search%2Fviews%2Fsearch%2Fview.php&r1=7455&r2=7456 http://www.securityfocus.com/archive/1/archive/1/474417/100/100/threaded
* Platforms Affected: Joomla! versions prior to 1.5 RC1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Joomla! (1.5 RC1 or later), available from the Joomla! Web site at http://www.joomla.org/ |
Related URL |
CVE-2007-4187 (CVE) |
Related URL |
24997 (SecurityFocus) |
Related URL |
35542 (ISS) |
|