Vulnerability Details : CVE-2011-5148
Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2011-5148
Probability of exploitation activity in the next 30 days: 29.96%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-5148
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2011-5148
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/72023
Simple File Upload module for Joomla! index.php code execution CVE-2011-5148 Vulnerability Report
-
http://www.exploit-db.com/exploits/18287
Joomla! Component Module Simple File Upload 1.3 - Remote Code Execution - PHP webapps Exploit
-
http://wasen.net/index.php?option=com_content&view=article&id=87&Itemid=59
404 - Article not found
-
http://docs.joomla.org/Vulnerable_Extensions_List#Simple_File_Upload_1.3
Archived:Vulnerable Extensions List - Joomla! Documentation
-
http://www.securityfocus.com/bid/51214
Joomla Simple File Upload 'index.php' Remote Code Execution Vulnerability
-
http://www.securityfocus.com/bid/51234
Joomla! Simple File Upload Arbitrary File Upload Vulnerability
Products affected by CVE-2011-5148
- cpe:2.3:a:wasen:mod_simplefileupload:*:*:*:*:*:*:*:*
- cpe:2.3:a:wasen:mod_simplefileupload:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wasen:mod_simplefileupload:1.1:*:*:*:*:*:*:*