CVE-2016-9836

The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types.
References
Link Resource
http://www.securityfocus.com/bid/94663 Third Party Advisory VDB Entry
https://github.com/XiphosResearch/exploits/tree/master/Joomraa Exploit Third Party Advisory
http://www.securityfocus.com/bid/94663 Third Party Advisory VDB Entry
https://github.com/XiphosResearch/exploits/tree/master/Joomraa Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94663 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94663 - Third Party Advisory, VDB Entry
References () https://github.com/XiphosResearch/exploits/tree/master/Joomraa - Exploit, Third Party Advisory () https://github.com/XiphosResearch/exploits/tree/master/Joomraa - Exploit, Third Party Advisory

Information

Published : 2016-12-05 17:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9836

Mitre link : CVE-2016-9836

CVE.ORG link : CVE-2016-9836


JSON object : View

Products Affected

joomla

  • joomla\!
CWE
CWE-284

Improper Access Control