Description
Multiple PHP remote file inclusion vulnerabilities in JD-WordPress for Joomla! (com_jd-wp) 2.0-1.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) wp-comments-post.php, (2) wp-feed.php, or (3) wp-trackback.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28297
exploitdb
WORKING POC
VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28296
exploitdb
WORKING POC
VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28295
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19209
Various Sources x_refsource_confirm
http://forum.joomla.org/index.php/topic%2C81064.0.html
Various Sources x_refsource_confirm
http://forum.joomla.org/index.php/topic%2C79477.0.html
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28998
Exploit x_refsource_misc
http://www.babilonics.com/?q=node/1802
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28999
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28997
Scores
EPSS
0.0623
EPSS Percentile
90.9%
Details
Status
published
Products (1)
joomla/jd-wordpress
2.0.1.0_rc2
Published
Sep 26, 2006
Tracked Since
Feb 18, 2026