cve/2009/CVE-2009-3822.md
2024-06-09 00:33:16 +00:00

19 lines
812 B
Markdown

### [CVE-2009-3822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3822)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
PHP remote file inclusion vulnerability in Fiji Web Design Ajax Chat (com_ajaxchat) component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter to tests/ajcuser.php.
### POC
#### Reference
- http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt
- http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt
#### Github
No PoCs found on GitHub currently.