Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote malicious users to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
joomla joomla 1.5.0_beta |