Vulnerability CVE-2013-5576


Published: 2013-10-09   Modified: 2013-10-12

Description:
administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5 allows remote authenticated users or remote attackers to bypass intended access restrictions and upload files with dangerous extensions via a filename with a trailing . (dot), as exploited in the wild in August 2013.

See advisories in our WLB2 database:
Topic
Author
Date
High
Joomla Media Manager File Upload Vulnerability
Juan vazquez
15.08.2013

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Joomla -> Joomla! 

 References:
http://www.kb.cert.org/vuls/id/639620
https://github.com/joomla/joomla-cms/commit/fa5645208eefd70f521cd2e4d53d5378622133d8
https://github.com/joomla/joomla-cms/commit/1ed07e257a2c0794ba19e864f7c5101e7e8c41d2
http://www.exploit-db.com/exploits/27610
http://www.cso.com.au/article/523528/joomla_patches_file_manager_vulnerability_responsible_hijacked_websites/
http://seclists.org/oss-sec/2013/q3/486
http://seclists.org/oss-sec/2013/q3/484
http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_item_id=31626
http://developer.joomla.org/security/563-20130801-core-unauthorised-uploads.html

Copyright 2024, cxsecurity.com

 

Back to Top