Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.joomla.org/Vulnerable_Extensions_List#Simple_File_Upload_1.3 - | |
References | () http://secunia.com/advisories/47370 - Vendor Advisory | |
References | () http://wasen.net/index.php?option=com_content&view=article&id=87&Itemid=59 - | |
References | () http://www.exploit-db.com/exploits/18287 - | |
References | () http://www.osvdb.org/78122 - | |
References | () http://www.securityfocus.com/bid/51214 - | |
References | () http://www.securityfocus.com/bid/51234 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/72023 - |
Information
Published : 2012-08-31 21:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5148
Mitre link : CVE-2011-5148
CVE.ORG link : CVE-2011-5148
JSON object : View
Products Affected
joomla
- joomla\!
wasen
- mod_simplefileupload
CWE