CVE-2015-8562
Vulnerability from cvelistv5
Published
2015-12-16 21:00
Modified
2024-08-06 08:20
Severity ?
Summary
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
References
cve@mitre.orghttp://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.htmlExploit
cve@mitre.orghttp://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html
cve@mitre.orghttp://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce
cve@mitre.orghttp://www.securityfocus.com/archive/1/537219/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/79195
cve@mitre.orghttps://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.htmlExploit
cve@mitre.orghttps://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.htmlVendor Advisory
cve@mitre.orghttps://www.exploit-db.com/exploits/38977/Exploit
cve@mitre.orghttps://www.exploit-db.com/exploits/39033/Exploit
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html
af854a3a-2127-422b-91ae-364da2661108http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/537219/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/79195
af854a3a-2127-422b-91ae-364da2661108https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.htmlExploit
af854a3a-2127-422b-91ae-364da2661108https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/38977/Exploit
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/39033/Exploit
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:20:43.177Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "39033",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/39033/"
          },
          {
            "name": "20151231 Joomla 1.5.x to 3.4.5 Object Injection Exploit (golang)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/537219/100/0/threaded"
          },
          {
            "name": "38977",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/38977/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html"
          },
          {
            "name": "79195",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/79195"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "39033",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/39033/"
        },
        {
          "name": "20151231 Joomla 1.5.x to 3.4.5 Object Injection Exploit (golang)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/537219/100/0/threaded"
        },
        {
          "name": "38977",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/38977/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html"
        },
        {
          "name": "79195",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/79195"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8562",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "39033",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/39033/"
            },
            {
              "name": "20151231 Joomla 1.5.x to 3.4.5 Object Injection Exploit (golang)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/537219/100/0/threaded"
            },
            {
              "name": "38977",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/38977/"
            },
            {
              "name": "http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html"
            },
            {
              "name": "https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html",
              "refsource": "CONFIRM",
              "url": "https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html"
            },
            {
              "name": "79195",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/79195"
            },
            {
              "name": "http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce",
              "refsource": "MISC",
              "url": "http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce"
            },
            {
              "name": "https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html",
              "refsource": "MISC",
              "url": "https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8562",
    "datePublished": "2015-12-16T21:00:00",
    "dateReserved": "2015-12-15T00:00:00",
    "dateUpdated": "2024-08-06T08:20:43.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-8562\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-12-16T21:59:06.390\",\"lastModified\":\"2024-11-21T02:38:44.480\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.\"},{\"lang\":\"es\",\"value\":\"Joomla! 1.5.x, 2.x y 3.x en versiones anteriores a 3.4.6 permite a atacantes remotos llevar a cabo ataques de inyecci\u00f3n de objetos PHP y ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de la cabecera HTTP User-Agent header, como fue explotado en Diciembre 2015.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65184BFE-A070-4099-B672-3A238E9F83EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"920129E4-F979-49B5-9B96-62BCBC3954D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1313BEAD-C0C0-4D8C-A3AA-F514BA6A1C92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90A8900-E441-46C4-A725-BA312358760E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74E276C-C62D-4828-89CB-80F526FEAEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E48636-9EDB-49BB-ABC8-D79864BFCB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580712F4-E97C-4E3F-BF9D-3445BEB4C3FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466E5E84-4C69-49F2-83DA-FC86202DB7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB968DF7-4A0B-474C-8639-06976837E03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6BE010-649F-4E48-97DC-DDF7511406D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8C4094-D028-4A55-B523-C90F5A4C9D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69FA6550-2135-4D41-B592-433FFFDEE180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73D78E0-BF24-433B-9F1B-03FD956C5779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BAC75B-DAC1-47E1-B9C9-48CF19489143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA97C8A-809D-44FC-95D2-5F269B6BF77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883B3DC0-6D6C-4C21-BC2A-EE53C140D817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7CFCF0F-BCD9-4215-817A-1409EA00CCBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5CB72A-9B5F-42B2-BEE1-3F92C04FB335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDBBD33-63E0-4377-95ED-45FAA1EED3E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B39FD1-44E2-43EC-B393-99E6208622B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F77BABA-7768-4F92-84C7-D247E4772749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"487204D9-7A9F-4A44-B625-FDBE2807444A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A5C8747-BF6A-4436-BC3A-A4B808AFF889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600F137D-4572-472E-B1E0-EF7A0A3ED443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E51BDBB-270D-4D4D-91D6-30114927667E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2861627F-EB9F-4B19-9E48-E3E9967EEE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15F42BC-7826-493B-8C5A-D70A7263DCB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC6CF00-2D88-4B97-A496-DCBE1B4E9A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25771A2-206B-4366-B9DE-34D8CE12AE99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F920ED-9578-4913-B851-3205BE13A7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E5F713F-F7EF-4E9B-BEB1-DDFDA0838D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9774D211-08D9-4339-B2AE-42434DBAF169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C03B8F0-9A63-4896-A8CA-8CE829DE6B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2086B989-8ED6-4DF2-92D6-2572315BEF86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEFFED66-B44C-47BC-A6FC-560DC9540001\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C552C590-F5AB-4B9C-9E18-ECE9E2753377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C291481-02FA-4AE1-A112-DDF704DFD450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA12F064-48B1-4A0B-B729-E8A60B101F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886DFC89-F4F9-4EA3-A83D-9ACAB1025592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23266955-F1A6-4A06-AC39-6DDCA89042D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500F31F1-59C7-4FC1-9F33-5868095147A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2ED09A7-6F6F-4D8E-B1C8-9F02587292A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB41BDFF-76E2-47F7-933C-BA1B62BEEB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB16BDD1-C100-46AD-B0BB-699E32BF7FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"287DD122-A85D-4B55-97AC-5861157A177E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C4C245-C895-450C-B319-D0A11AA6F4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194B27E6-49C4-409F-B727-38E5C904CD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFF133F-44AF-46FF-9A62-272D0A10C539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60787DEA-EA05-411C-BFFB-DB061D28BE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24DA6BF-5321-4E54-B2BA-7573CCD2FA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F968BB79-8712-4C2D-AF77-B4B57862CB30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7A5257-5617-43CC-AFA8-5FED7FCCFE38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"407C8BD8-B870-43D3-B735-9D7B52B1012A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA936AAF-A6E6-42AE-81D6-FC12BD5F74E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB51FDA-2080-447C-A57A-B95A1A9741E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"709046EE-05BE-4B74-A364-ECCE4165EAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEEFBF9-82AC-425E-ADA7-CA84EBEF69EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BA879-7B9E-4009-8059-3B7511E912F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01879A02-1248-44D9-A106-4CAED12B3D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860AF6DE-436A-4051-8730-038FD2B04C4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEFB738-56D7-4C73-BC13-C62BD9FD90AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC3C521-D8DF-4111-8074-ADFEC3426396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65365011-7019-430D-BE32-9E0124F27841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A2A21F-C41F-4A30-BA2E-A6DEB761C7EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89D10456-3735-4F8F-A97B-9D8D561BA717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F5CA89-A8B2-4A7A-B4D7-DC884B8A9B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8EC3C1-7CCE-4FA3-A759-91051F9124CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E961CDDB-C81D-4CB3-8AFC-D869D044A2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795E7538-038C-42D7-B4A8-BED0F120B605\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38EBE5-69C4-4F10-9AED-4E7E51B19BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E760A5AA-299D-47EA-895F-B9CA212D8BAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CF53BD-6A52-41D3-8BB3-B08AC81C65E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE739F2A-795E-4721-A36D-BC269A6BC03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE74090E-8F37-442E-A29C-DE41898291C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECDCEDF-7FFD-48C4-B655-0E8C03BB36FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6037D413-3356-4801-8886-57D990DC25A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A2FDC8-9123-49BC-8A2B-719192913172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA80B0B6-590F-4550-9984-BABB24B268F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F36C2F51-7B04-4B57-AC3A-E2B245FE182F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83513309-01CD-411C-82EF-62C1F7F4764F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BABCB8-916D-452E-8848-B51B3374CE8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD14669F-9C13-46BA-A45B-EC0B4081D105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370F58E9-AD21-446F-BC29-10F2A448F18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C7EA5D-CEB8-45C6-A50F-577B02BBD25F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A3ED8A4-60AF-4347-8A4E-41BAF7ED09B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B4D693-A540-4FB3-B7F9-9746F01B44CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9623DC6-3822-4493-A0CC-C87134799D67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B71C854-FDCA-40C9-BB18-D7947BE81F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3861B6-CBD7-438E-A067-AEAEBB6C09B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA20940F-8056-4F18-8D8A-4CE1EE22327E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA6D81D1-16F7-448B-BA23-C24AAAE1A096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"176F330D-DAC5-4D3E-823D-E59E6469D089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E76ADE1-A88F-468B-8D9C-72B90AF2A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98475DA0-9D72-4952-878B-4DD619132E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6C4C68-E526-408F-A54D-86CB3E5D800F\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/537219/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/79195\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/38977/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.exploit-db.com/exploits/39033/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/537219/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/79195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/38977/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.exploit-db.com/exploits/39033/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.