Description
PHP remote file inclusion vulnerability in class/php/d4m_ajax_pagenav.php in the D4J eZine (com_ezine) component 2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by kaMtiEz · textwebappsphp
https://www.exploit-db.com/exploits/10178
References (3)
Core 3
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37043
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/54307
Exploit, URL Repurposed x_refsource_misc
http://www.kamtiez.org/2009/11/joomla-mambo-component-comezine-remote.html
Scores
EPSS
0.0090
EPSS Percentile
75.8%
Details
CWE
CWE-94
Status
published
Products (1)
designforjoomla/com_ezine
2.1
Published
Nov 29, 2009
Tracked Since
Feb 18, 2026