Remote PHP code execution in Joomla!

Published: 2015-12-14 12:41:12 | Updated: 2016-07-18
Severity Critical
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2015-8562
CVSSv3 9.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]
CWE ID CWE-94
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software Joomla!
Vulnerable software versions Joomla! 1.5
Joomla! 1.5.1
Joomla! 1.5.2

Show more

Vendor URL Joomla!

Security Advisory

1) Remote PHP code execution

Description

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The vulnerability exists due to insufficient filtration of HTTP User-Agent header and filter-search HTTP POST parameter before storing them into database. A remote unauthenticated attacker can permanently inject and execute arbitrary PHP code on the target system with privileges of the web server.

Successful exploitation of this vulnerability will allow a remote attacker to gain complete control over the vulnerable web application and execute arbitrary PHP code on the target system.

Note: this is a zero-day vulnerability and it is being exploited in the wild.

Remediation

Update your Joomla! installation to version 3.4.6.

External links

https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.h...
https://www.cybersecurity-help.cz/blog/30.html