Skip to main content

Joomla! Arbitrary File Upload Vulnerability

Last Update Date: 5 Aug 2013 11:44 Release Date: 5 Aug 2013 3902 Views

RISK: Medium Risk

TYPE: Servers - Web Servers

TYPE: Web Servers

A vulnerability has been identified in Joomla!, which can be exploited by malicious users to compromise a vulnerable system.

The vulnerability is caused due to the administrator/components/com_media/helpers/media.php script improperly validating the extension of an uploaded file. This can be exploited to e.g. execute arbitrary PHP code by uploading a PHP file using a ".php." extension.

Successful exploitation requires permissions to upload files and that the web server is configured to handle ".php." extensions as PHP scripts.


Impact

  • Remote Code Execution

System / Technologies affected

  • Joomla! 2.x
  • Joomla! 3.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 2.5.14 or 3.1.5.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link