First published: Thu Oct 11 2007(Updated: )
Multiple PHP remote file inclusion vulnerabilities in the Avant-Garde Solutions MOSMedia Lite (com_mosmedia) 4.5.1 component for Mambo and Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) credits.html.php, (2) info.html.php, (3) media.divs.php, (4) media.divs.js.php, (5) purchase.html.php, or (6) support.html.php in includes/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: vector 3 may be the same as CVE-2007-2043.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ag-solutions MOSMedia Lite | =4.5.1 | |
Mambo (MamboCMS) | ||
Joomla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5362 has a severity rating that indicates it poses significant risk due to the ability of remote attackers to execute arbitrary PHP code.
To fix CVE-2007-5362, update your Avant-Garde Solutions MOSMedia Lite component to the latest version or implement proper input validation to sanitize the mosConfig_absolute_path parameter.
CVE-2007-5362 affects the Avant-Garde Solutions MOSMedia Lite component version 4.5.1 for Mambo and Joomla.
By exploiting CVE-2007-5362, attackers can execute arbitrary PHP code, potentially leading to full server control or data breaches.
While CVE-2007-5362 is an older vulnerability, it may still pose a threat to systems that have not been updated or are using outdated software.