CVE-2006-4992

JD-WordPress for Joomla! 2.0-1.0 RC2 - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in JD-WordPress for Joomla! (com_jd-wp) 2.0-1.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) wp-comments-post.php, (2) wp-feed.php, or (3) wp-trackback.php.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28297
exploitdb WORKING POC VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28296
exploitdb WORKING POC VERIFIED
by Drago84 · textwebappsphp
https://www.exploit-db.com/exploits/28295

References (7)

Core 7
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/19209
Various Sources x_refsource_confirm
http://forum.joomla.org/index.php/topic%2C81064.0.html
Various Sources x_refsource_confirm
http://forum.joomla.org/index.php/topic%2C79477.0.html
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/28998
Exploit x_refsource_misc
http://www.babilonics.com/?q=node/1802
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/28999
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/28997

Scores

EPSS 0.0623
EPSS Percentile 90.9%

Details

Status published
Products (1)
joomla/jd-wordpress 2.0.1.0_rc2
Published Sep 26, 2006
Tracked Since Feb 18, 2026