"evaluatorSolution":"Successful exploitation requires that \"register_globals\" is enabled.\r\nThis vulnerability is addressed in the following product release:\r\nJoomla!, JD-Wiki, 1.0.3",
"descriptions":[
{
"lang":"en",
"value":"PHP remote file inclusion vulnerability in lib/tpl/default/main.php in the JD-Wiki Component (com_jd-wiki) 1.0.2 and earlier for Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter."
},
{
"lang":"es",
"value":"Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en lib/tpl/default/main.php en el JD-Wiki Component (com_jd-wiki) 1.0.2 y versiones anteriores para Joomla! cuando register_globals est\u00e1 activado, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro mosConfig_absolute_path."