Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mambo:mambo:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "BDF610B9-1105-4C37-B93E-4677311747F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "17E99D52-609D-4631-AC22-70B07229D887", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "729C14E1-B56D-49E1-81F6-5FA9B4FDC477", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1_1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "EAFE201B-A40F-4387-B855-5176A828BA58", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1a:*:*:*:*:*:*:*", "matchCriteriaId": "85B95AF0-CDD3-41FB-B343-46A69E909F68", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1a:a:*:*:*:*:*:*", "matchCriteriaId": "21CD2A4A-6D6D-447A-9305-891B9F084735", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1a:beta:*:*:*:*:*:*", "matchCriteriaId": "D0AED1C3-740C-4EDE-A674-D753496A406A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.1a:beta_2:*:*:*:*:*:*", "matchCriteriaId": "5D7E78E2-1712-4B84-9EDD-58AF95AE6815", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "68EE93EF-D273-4DEC-A85C-76290FEE40A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3AC21C1E-131A-4366-8741-7BE7594B6F59", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "993587DE-DA24-4D52-B190-AB236327D687", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "16ED2979-BB01-44E7-A0A3-D1B7F550F538", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.3h:*:*:*:*:*:*:*", "matchCriteriaId": "2E4E3399-C743-4664-A55A-77BF543CBD42", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5.3h:h:*:*:*:*:*:*", "matchCriteriaId": "F009FC3C-4830-4D35-8D4A-4C84DBE8AF78", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "49269426-5FA7-4CF1-AF64-BEC97A09E7E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "863BE900-E43A-4E0E-BB25-A7403305F4EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AE971092-FF34-4F5C-A088-82914D46CE0B", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:*:*:*:*:*:*:*", "matchCriteriaId": "953A9204-E94E-4756-A687-FBE781ACE158", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:beta:*:*:*:*:*:*", "matchCriteriaId": "2DE8D25B-73E4-464F-8076-FC491B9F2861", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.5_1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2C7E14F4-A0E9-4014-8C3E-E6DCF3393D3F", "vulnerable": true}, {"criteria": "cpe:2.3:a:mambo:mambo:4.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "57753E34-F22B-415C-8F0A-B8EFFC624559", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in contentpublisher.php in the contentpublisher component (com_contentpublisher) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by third parties who state that contentpublisher.php protects against direct request in the most recent version. The original researcher is known to be frequently inaccurate"}, {"lang": "es", "value": "** IMPUGNADA ** Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en contentpublisher.php del componente contentpublisher (com_contentpublisher) para Mambo permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro mosconfig_absolute_path. NOTA: Esta vulnerabilidad ha sido impugnada por terceros que establecen que el contentpublisher.php est\u00e1 protegido contra peticiones directas en la versi\u00f3n m\u00e1s reciente. El investigador original es conocido por ser frecuentemente impreciso."}], "id": "CVE-2006-4286", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2006-08-22T17:04:00.000", "references": [{"source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1431"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/28093"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/443626/100/0/threaded"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/444244/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1431"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/28093"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/443626/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/444244/100/0/threaded"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}