{ "schema_version": "1.4.0", "id": "GHSA-r893-xw42-rx44", "modified": "2025-04-03T04:38:23Z", "published": "2022-05-01T07:15:10Z", "aliases": [ "CVE-2006-4074" ], "details": "PHP remote file inclusion vulnerability in lib/tpl/default/main.php in the JD-Wiki Component (com_jd-wiki) 1.0.2 and earlier for Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4074" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28253" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/2125" }, { "type": "WEB", "url": "http://secunia.com/advisories/21389" }, { "type": "WEB", "url": "http://www.joomladeveloping.org/component/option%2Ccom_jd-wp/Itemid%2C29/p%2C33" }, { "type": "WEB", "url": "http://www.joomladeveloping.org/component/option,com_jd-wp/Itemid,29/p,33" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19373" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3192" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-08-11T01:04:00Z" } }