Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-2905
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-30 Jun, 2008 | 18:24
Updated At-29 Sep, 2017 | 01:31

PHP remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

MamboServer
mambo
>>mambo>>4.0.14
cpe:2.3:a:mambo:mambo:4.0.14:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5
cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.0.2
cpe:2.3:a:mambo:mambo:4.5.0.2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.1.3
cpe:2.3:a:mambo:mambo:4.5.1.3:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.1_1.0.9
cpe:2.3:a:mambo:mambo:4.5.1_1.0.9:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.1_beta
cpe:2.3:a:mambo:mambo:4.5.1_beta:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.1_beta2
cpe:2.3:a:mambo:mambo:4.5.1_beta2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.1a
cpe:2.3:a:mambo:mambo:4.5.1a:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.2
cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.2.1
cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.2.2
cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.2.3
cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.3h
cpe:2.3:a:mambo:mambo:4.5.3h:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5.4
cpe:2.3:a:mambo:mambo:4.5.4:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5_1.0.0
cpe:2.3:a:mambo:mambo:4.5_1.0.0:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5_1.0.1
cpe:2.3:a:mambo:mambo:4.5_1.0.1:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5_1.0.2
cpe:2.3:a:mambo:mambo:4.5_1.0.2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5_1.0.3_beta
cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.5_1.0.9
cpe:2.3:a:mambo:mambo:4.5_1.0.9:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.6
cpe:2.3:a:mambo:mambo:4.6:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.6.1
cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.6.2
cpe:2.3:a:mambo:mambo:4.6.2:*:*:*:*:*:*:*
MamboServer
mambo
>>mambo>>4.6.4
cpe:2.3:a:mambo:mambo:4.6.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/30685cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/29716cve@mitre.org
Exploit
http://www.securitytracker.com/id?1020295cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/43101cve@mitre.org
N/A
https://www.exploit-db.com/exploits/5808cve@mitre.org
N/A
Change History
0Changes found

Details not found