PHP remote file inclusion vulnerability in langset.php in J! Reactions (com_jreactions) 1.8.1 and earlier, a Joomla! component, allows remote attackers to execute arbitrary PHP code via a URL in the comPath parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://securityreason.com/securityalert/2984 | third party advisory |
http://www.securityfocus.com/bid/25198 | vdb entry exploit |
http://yollubunlar.org/joomla-j-reactions-component-rfi-75.html | |
http://www.securityfocus.com/archive/1/477245/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/477144/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/475544/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35808 | vdb entry |