First published: Fri Aug 11 2006(Updated: )
PHP remote file inclusion vulnerability in lib/tpl/default/main.php in the JD-Wiki Component (com_jd-wiki) 1.0.2 and earlier for Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla Jd-wiki | <=1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4074 has a critical severity rating due to its potential to allow remote attackers to execute arbitrary PHP code.
To fix CVE-2006-4074, upgrade the JD-Wiki Component to version 1.0.3 or later where the vulnerability is addressed.
CVE-2006-4074 affects Joomla! installations running JD-Wiki Component versions 1.0.2 and earlier with register_globals enabled.
Yes, remote attackers can exploit CVE-2006-4074 by injecting URLs into the mosConfig_absolute_path parameter.
CVE-2006-4074 is associated with PHP, as it involves remote file inclusion vulnerabilities in a PHP-based application.