Description
Multiple PHP remote file inclusion vulnerabilities in JAF CMS 4.0 and 4.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the main_dir parameter to (1) forum/main.php and (2) forum/headlines.php.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by ThE TiGeR · textwebappsphp
https://www.exploit-db.com/exploits/2474
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20329
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29348
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5317
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22143
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/2474/
Exploit x_refsource_misc
http://www.rahim.webd.pl/exploity/Exploits/92.txt
Scores
EPSS
0.0835
EPSS Percentile
92.3%
Details
CWE
CWE-94
Status
published
Products (1)
salims_softhouse/jaf_cms
4.0 rc1 (2 CPE variants)
Published
Mar 06, 2007
Tracked Since
Feb 18, 2026