7.9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.166 Low
EPSS
Percentile
96.0%
Multiple PHP remote file inclusion vulnerabilities in (1) uhp_config.php, and possibly (2) footer.php, (3) functions.php, (4) install.uhp.php, (5) toolbar.uhp.html.php, (6) uhp.class.php, and (7) uninstall.uhp.php, in the UHP (User Home Pages) 0.5 component (aka com_uhp) for Mambo or Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
CPE | Name | Operator | Version |
---|---|---|---|
user_home_pages:user_home_pages | user home pages | eq | 0.5 |
attrition.org/pipermail/vim/2007-March/001457.html
attrition.org/pipermail/vim/2007-March/001458.html
kurdishsecurity.blogspot.com/2006/07/kurdish-security-15-user-home-pges.html
secunia.com/advisories/21305
www.osvdb.org/27651
www.osvdb.org/27652
www.osvdb.org/28111
www.osvdb.org/28112
www.osvdb.org/28113
www.ravenswoodit.co.uk/index.php?option=com_docman&task=cat_view&gid=76&Itemid=13
www.securityfocus.com/bid/19233
www.securityfocus.com/bid/23113
www.vupen.com/english/advisories/2006/3056
exchange.xforce.ibmcloud.com/vulnerabilities/28080
exchange.xforce.ibmcloud.com/vulnerabilities/33178
www.exploit-db.com/exploits/2089
www.exploit-db.com/exploits/3553