Description
PHP remote file inclusion vulnerability in admin.a6mambocredits.php in the a6mambocredits component (com_a6mambocredits) 2.0.0 and earlier for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Cmaster4 · textwebappsphp
https://www.exploit-db.com/exploits/2207
References (7)
Core 7
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/2207
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/27991
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19581
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28443
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21540
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1016716
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3311
Scores
EPSS
0.0745
EPSS Percentile
91.8%
Details
CWE
CWE-94
Status
published
Products (1)
mambo/a6mambocredits_component
2.0.0
Published
Aug 22, 2006
Tracked Since
Feb 18, 2026