Vulnerability Name: | CVE-2008-2905 (CCN-43101) | ||||||||
Assigned: | 2008-06-13 | ||||||||
Published: | 2008-06-13 | ||||||||
Updated: | 2017-09-29 | ||||||||
Summary: | PHP remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
6.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-2905 Source: CCN Type: Mambo Foundation Web site Mambo CMS Source: CCN Type: Packetstorm Security Website Mambo 4.6.4 Remote File Inclusion Source: CCN Type: SA30685 Mambo "includes/Cache/Lite/Output.php" File Inclusion Source: SECUNIA Type: Vendor Advisory 30685 Source: CCN Type: SECTRACK ID: 1020295 Mambo Include File Bug in Cache_Lite Class Lets Remote Users Execute Arbitrary Code Source: CCN Type: OSVDB ID: 46173 Cache_Lite Package for Mambo includes/Cache/Lite/Output.php mosConfig_absolute_path Parameter Remote File Inclusion Source: BID Type: Exploit 29716 Source: CCN Type: BID-29716 Mambo Cache_Lite Class 'mosConfig_absolute_path' Remote File Include Vulnerability Source: SECTRACK Type: UNKNOWN 1020295 Source: XF Type: UNKNOWN mambo-output-file-include(43101) Source: XF Type: UNKNOWN mambo-output-file-include(43101) Source: EXPLOIT-DB Type: UNKNOWN 5808 Source: CCN Type: Rapid7 Vulnerability and Exploit Database [06-14-2008] Mambo Cache_Lite Class mosConfig_absolute_path Remote File Include | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |