{ "schema_version": "1.4.0", "id": "GHSA-rrxj-w3mr-763v", "modified": "2025-04-03T04:38:35Z", "published": "2022-05-01T07:15:47Z", "aliases": [ "CVE-2006-4130" ], "details": "PHP remote file inclusion vulnerability in admin.remository.php in the Remository Component (com_remository) 3.25 and earlier for Mambo and Joomla!, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4130" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28330" }, { "type": "WEB", "url": "http://secunia.com/advisories/21477" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/1379" }, { "type": "WEB", "url": "http://www.remository.com/component/option%2Ccom_mamboboard/func%2Cview/catid%2C6/id%2C3666/#3666" }, { "type": "WEB", "url": "http://www.remository.com/component/option,com_mamboboard/func,view/catid,6/id,3666/#3666" }, { "type": "WEB", "url": "http://www.remository.com/rem/Remository/Download/Mambo-Software/ReMOSitory-components/Remository-3.26" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/442869/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19465" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3270" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-08-14T23:04:00Z" } }