// For flags

CVE-2007-2196

 

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

PHP remote file inclusion vulnerability in jambook.php in the Jambook (com_Jambook) 1.0 beta7 module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by a reliable third party because the jambook.php protects against direct request

** EN DISPUTA ** Vulnerabilidad de inclusión de archivos remotos de PHP en jambook.php en el módulo Jambook (com_Jambook) versión 1.0 beta7 para Mambo y Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_absolute_path. NOTA: este problema ha sido impugnado por una tercera parte fiable porque jambook.php se protege frente a una petición directa.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-04-24 CVE Reserved
  • 2007-04-24 CVE Published
  • 2024-04-04 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Joomla
Search vendor "Joomla"
Jambook
Search vendor "Joomla" for product "Jambook"
1.0_beta_7
Search vendor "Joomla" for product "Jambook" and version "1.0_beta_7"
-
Affected
Mambo
Search vendor "Mambo"
Jambook
Search vendor "Mambo" for product "Jambook"
1.0_beta_7
Search vendor "Mambo" for product "Jambook" and version "1.0_beta_7"
-
Affected