Description
Multiple PHP remote file inclusion vulnerabilities in the MojoBlog component RC 0.15 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) wp-comments-post.php and (2) wp-trackback.php.
Exploits (1)
References (2)
Core 2
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37179
Exploit x_refsource_misc
http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt
Scores
EPSS
0.0094
EPSS Percentile
76.3%
Details
CWE
CWE-94
Status
published
Products (1)
mojoblog/mojoblog
rc0.15
Published
Apr 21, 2010
Tracked Since
Feb 18, 2026