Joomla! Arbitrary File Upload Vulnerability
RISK: Medium Risk
TYPE: Servers - Web Servers
A vulnerability has been identified in Joomla!, which can be exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the administrator/components/com_media/helpers/media.php script improperly validating the extension of an uploaded file. This can be exploited to e.g. execute arbitrary PHP code by uploading a PHP file using a ".php." extension.
Successful exploitation requires permissions to upload files and that the web server is configured to handle ".php." extensions as PHP scripts.
Impact
- Remote Code Execution
System / Technologies affected
- Joomla! 2.x
- Joomla! 3.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 2.5.14 or 3.1.5.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with