Korean
<< Back
VID 210074
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Joomla! program is vulnerable to a command execution vulnerability via the 'searchword' parameter. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.5 RC1 could allow a remote attacker to execute arbitrary commands on the system, caused by multiple eval injection vulnerabilities in the com_search component. By sending a specially-crafted URL request using the searchword parameter, a remote attacker could execute arbitrary PHP code on the affected host with the privileges of the web server.

* References:
http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopment%2Ftrunk%2Fcomponents%2Fcom_search%2Fviews%2Fsearch%2Fview.php&r1=7455&r2=7456
http://www.securityfocus.com/archive/1/archive/1/474417/100/100/threaded

* Platforms Affected:
Joomla! versions prior to 1.5 RC1
Any operating system Any version
Recommendation Upgrade to the latest version of Joomla! (1.5 RC1 or later), available from the Joomla! Web site at http://www.joomla.org/
Related URL CVE-2007-4187 (CVE)
Related URL 24997 (SecurityFocus)
Related URL 35542 (ISS)