1 results (0.001 seconds)

CVSS: 6.8EPSS: 2%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in the Clickheat - Heatmap stats (com_clickheat) component 1.0.1 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) install.clickheat.php, (b) Cache.php and (c) Clickheat_Heatmap.php in Recly/Clickheat/, and (d) Recly/common/GlobalVariables.php; and the (2) mosConfig_absolute_path parameter to (e) _main.php and (f) main.php in includes/heatmap, and (g) includes/overview/main.php. Múltiples vulnerabilidades de inclusión de archivo PHP remoto en el componente para Joomla! Clickheat - Heatmap stats (com_clickheat) v1.0.1, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro (1) GLOBALS[mosConfig_absolute_path] de (a) install.clickheat.php, (b) Cache.php y (c) Clickheat_Heatmap.php en Recly/Clickheat/, y (d) Recly/common/GlobalVariables.php; y el parámetro (2) mosConfig_absolute_path de (e) _main.php y (f) main.php en includes/heatmap, y (g) includes/overview/main.php. • https://www.exploit-db.com/exploits/7038 http://securityreason.com/securityalert/4841 http://www.securityfocus.com/bid/32190 https://exchange.xforce.ibmcloud.com/vulnerabilities/46439 • CWE-94: Improper Control of Generation of Code ('Code Injection') •