{ "id": "CVE-2006-4378", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-26T21:04:00.000", "lastModified": "2024-04-11T00:40:51.190", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in the Rssxt component for Joomla! (com_rssxt), possibly 2.0 Beta 1 or 1.0 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) pinger.php, (2) RPC.php, or (3) rssxt.php. NOTE: another researcher has disputed this issue, saying that the attacker can not control this parameter. In addition, as of 20060825, the original researcher has appeared to be unreliable with some other past reports. CVE has not performed any followup analysis with respect to this issue" }, { "lang": "es", "value": "** IMPUGNADA ** M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en el componente Rssxt para Joomla! (com_rssxt), posiblemente 2.0 Beta 1 o 1.0 y anteriores, permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro mosConfig_absolute_path en (1) pinger.php, (2) RPC.php, o (3) rssxt.php. NOTA: otro investigador ha impugnado este problema, diciendo que el atacante no puede controlar este par\u00e1metro. Adem\u00e1s, a fecha de 25/8/2006, el investigador original se ha mostrado poco fiable seg\u00fan algunos reportes anteriores. CVE no ha realizado ning\u00fan an\u00e1lisis de seguimiento con respecto a este problema." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:joomla:rssxt_component:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.0_beta_1", "matchCriteriaId": "4BDB453C-598C-46B5-9A58-EF3B7AF55B79" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joomla:rssxt_component:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "403550AF-3773-4C5A-92C4-74C091C65FFE" } ] } ] } ], "references": [ { "url": "http://securityreason.com/securityalert/1456", "source": "cve@mitre.org" }, { "url": "http://www.osvdb.org/28096", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/443628/100/100/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/444058/100/100/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/19593", "source": "cve@mitre.org" } ] }