Vulnerabilities > CVE-2006-4469 - Unspecified vulnerability in Joomla Joomla!
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN joomla
nessus
Summary
Unspecified vulnerability in PEAR.php in Joomla! before 1.0.11 allows remote attackers to perform "remote execution," related to "Injection Flaws."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 12 |
Nessus
NASL family | CGI abuses |
NASL id | JOOMLA_1011_CMD_EXEC.NASL |
description | The version of Joomla! installed on the remote host is affected by a remote code execution vulnerability in the includes/PEAR/PEAR.php script. An unauthenticated, remote attacker can exploit this to execute arbitrary code, subject to the privileges of the web server user ID. Note that successful exploitation of this vulnerability requires that the PHP |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22298 |
published | 2006-09-01 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/22298 |
title | Joomla! < 1.0.11 Unspecified Remote Code Execution |
References
- http://secunia.com/advisories/21666
- http://secunia.com/advisories/21666
- http://www.joomla.org/content/view/1841/78/
- http://www.joomla.org/content/view/1841/78/
- http://www.joomla.org/content/view/1843/74/
- http://www.joomla.org/content/view/1843/74/
- http://www.vupen.com/english/advisories/2006/3408
- http://www.vupen.com/english/advisories/2006/3408
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28629
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28629