Vulnerabilities > CVE-2011-5148 - Remote Code Execution vulnerability in Wasen MOD Simplefileupload 1.0/1.1/1.3
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 |
Exploit-Db
description | Joomla Module Simple File Upload 1.3 - Remote Code Execution. CVE-2011-5148. Webapps exploit for php platform |
file | exploits/php/webapps/18287.php |
id | EDB-ID:18287 |
last seen | 2016-02-02 |
modified | 2011-12-28 |
platform | php |
port | |
published | 2011-12-28 |
reporter | gmda |
source | https://www.exploit-db.com/download/18287/ |
title | Joomla Module Simple File Upload 1.3 - Remote Code Execution |
type | webapps |
References
- http://docs.joomla.org/Vulnerable_Extensions_List#Simple_File_Upload_1.3
- http://secunia.com/advisories/47370
- http://wasen.net/index.php?option=com_content&view=article&id=87&Itemid=59
- http://www.exploit-db.com/exploits/18287
- http://www.osvdb.org/78122
- http://www.securityfocus.com/bid/51214
- http://www.securityfocus.com/bid/51234
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72023