PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/37043 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54307 | vdb entry |
http://www.kamtiez.org/2009/11/joomla-mambo-component-comezine-remote.html | exploit url repurposed |