| VID |
210074 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Joomla! program is vulnerable to a command execution vulnerability via the 'searchword' parameter. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.5 RC1 could allow a remote attacker to execute arbitrary commands on the system, caused by multiple eval injection vulnerabilities in the com_search component. By sending a specially-crafted URL request using the searchword parameter, a remote attacker could execute arbitrary PHP code on the affected host with the privileges of the web server.
* References: http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopment%2Ftrunk%2Fcomponents%2Fcom_search%2Fviews%2Fsearch%2Fview.php&r1=7455&r2=7456 http://www.securityfocus.com/archive/1/archive/1/474417/100/100/threaded
* Platforms Affected: Joomla! versions prior to 1.5 RC1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Joomla! (1.5 RC1 or later), available from the Joomla! Web site at http://www.joomla.org/ |
| Related URL |
CVE-2007-4187 (CVE) |
| Related URL |
24997 (SecurityFocus) |
| Related URL |
35542 (ISS) |
|