First published: Fri Oct 12 2007(Updated: )
Multiple PHP remote file inclusion vulnerabilities in the JContentSubscription (com_jcs) 1.5.8 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) jcs.function.php; (2) add.php, (3) history.php, and (4) register.php, in view/; and (5) list.sub.html.php, (6) list.user.sub.html.php, and (7) reports.html.php in views/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JoomlaEquipment JContentSubscription | =1.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5407 has a high severity rating due to its potential for remote code execution.
To fix CVE-2007-5407, update the JContentSubscription component to a version that addresses these vulnerabilities.
CVE-2007-5407 specifically affects JContentSubscription version 1.5.8 for Joomla!.
Yes, CVE-2007-5407 can be exploited by remote attackers without requiring authentication.
Exploiting CVE-2007-5407 can allow attackers to execute arbitrary PHP code, potentially compromising the server.