ID OSVDB:37175
Type osvdb
Reporter OSVDB
Modified 2007-09-12T17:21:32
Description
No description provided by the source
References:
Vendor URL: http://detodo.masde50.net/index.php?option=com_remository&Itemid=27&func=fileinfo&id=99
Secunia Advisory ID:26756
Other Advisory URL: http://milw0rm.com/exploits/4383
Mail List Post: http://www.attrition.org/pipermail/vim/2007-September/001779.html
ISS X-Force ID: 36538
FrSIRT Advisory: ADV-2007-3139
CVE-2007-4817
Bugtraq ID: 25612
{"href": "https://vulners.com/osvdb/OSVDB:37175", "id": "OSVDB:37175", "reporter": "OSVDB", "published": "2007-09-12T17:21:32", "description": "# No description provided by the source\n\n## References:\nVendor URL: http://detodo.masde50.net/index.php?option=com_remository&Itemid=27&func=fileinfo&id=99\n[Secunia Advisory ID:26756](https://secuniaresearch.flexerasoftware.com/advisories/26756/)\nOther Advisory URL: http://milw0rm.com/exploits/4383\nMail List Post: http://www.attrition.org/pipermail/vim/2007-September/001779.html\nISS X-Force ID: 36538\nFrSIRT Advisory: ADV-2007-3139\n[CVE-2007-4817](https://vulners.com/cve/CVE-2007-4817)\nBugtraq ID: 25612\n", "title": "Restaurante Component for Joomla! Crafted File Extension Unrestricted Upload", "lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "references": [], "edition": 1, "cvelist": ["CVE-2007-4817"], "affectedSoftware": [], "viewCount": 21, "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2017-04-28T13:20:33", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-4817"]}, {"type": "exploitdb", "idList": ["EDB-ID:4383"]}], "modified": "2017-04-28T13:20:33", "rev": 2}, "vulnersScore": 6.3}, "modified": "2007-09-12T17:21:32"}
{"cve": [{"lastseen": "2020-10-03T11:45:53", "description": "Unrestricted file upload vulnerability in the Restaurante (com_restaurante) component for Joomla! allows remote attackers to upload and execute arbitrary PHP code via an upload action specifying a filename with a double extension such as .php.jpg, which creates an accessible file under img_original/.", "edition": 3, "cvss3": {}, "published": "2007-09-11T19:17:00", "title": "CVE-2007-4817", "type": "cve", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4817"], "modified": "2017-09-29T01:29:00", "cpe": ["cpe:/a:detodas:restaurante_component_for_joomla:*"], "id": "CVE-2007-4817", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4817", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:detodas:restaurante_component_for_joomla:*:*:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2016-01-31T20:48:11", "description": "Joomla Component Restaurante Remote File Upload Vulnerability. CVE-2007-4817. Webapps exploit for php platform", "published": "2007-09-08T00:00:00", "type": "exploitdb", "title": "Joomla Component Restaurante Remote File Upload Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-4817"], "modified": "2007-09-08T00:00:00", "id": "EDB-ID:4383", "href": "https://www.exploit-db.com/exploits/4383/", "sourceData": "Joomla Component Restaurante <= Remote File Upload Vulnerability\n\nfound by : Cold z3ro\n\nHomepage : www.hackteach.org , www.xp10.com\n\n================================================================\n\n@################################################################@\n# joomla/index.php?option=com_restaurante&task=upload\n#\n# /joomla/components/com_restaurante/img_original/.shell.php.jpg\n#\n# Dork : /index.php?option=com_restaurante\n@################################################################@\n\n\nAttacker can upload any file using this link\n\njoomla/index.php?option=com_restaurante&task=upload\n\nafter upload the file , He can find it in :\n\n/components/com_restaurante/img_original\n\nBut the attacker should add ( Point ) befor filename\n\nExample :\n\nif attacker uploaded file named shell.php.jpg\n\nits name will by like this .shell.php.jpg\n\nin path :\n\n/components/com_restaurante/img_original/.shell.php.jpg\n\n# milw0rm.com [2007-09-08]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/4383/"}]}