Lucene search

K
saintSAINT CorporationSAINT:C56CCB8DBCA77BE133884EA3A5772544
HistoryDec 17, 2015 - 12:00 a.m.

Joomla User-Agent PHP object injection

2015-12-1700:00:00
SAINT Corporation
download.saintcorporation.com
28

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%

Added: 12/17/2015
CVE: CVE-2015-8562
BID: 79195

Background

Joomla is a content management system written in PHP.

Problem

A vulnerability which occurs when Joomla saves browser session information could allow a remote, unauthenticated attacker to inject PHP objects via the User-Agent header, leading to arbitrary command execution.

Resolution

Upgrade to Joomla 3.4.6 or higher.

References

<https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html&gt;
<https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html&gt;

Limitations

Exploit works on Joomla 3.4.5 running on Linux.

Platforms

Linux

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%