Vulnerability Details : CVE-2011-5148
Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012.
Vulnerability category: Execute code
Products affected by CVE-2011-5148
- cpe:2.3:a:wasen:mod_simplefileupload:*:*:*:*:*:*:*:*
- cpe:2.3:a:wasen:mod_simplefileupload:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wasen:mod_simplefileupload:1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-5148
15.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-5148
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2011-5148
-
http://secunia.com/advisories/47370
Sign inVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/72023
Simple File Upload module for Joomla! index.php code execution CVE-2011-5148 Vulnerability Report
-
http://www.exploit-db.com/exploits/18287
Joomla! Component Module Simple File Upload 1.3 - Remote Code Execution - PHP webapps Exploit
-
http://wasen.net/index.php?option=com_content&view=article&id=87&Itemid=59
404 - Article not found
-
http://www.osvdb.org/78122
404 Not Found
-
http://docs.joomla.org/Vulnerable_Extensions_List#Simple_File_Upload_1.3
Archived:Vulnerable Extensions List - Joomla! Documentation
-
http://www.securityfocus.com/bid/51214
Joomla Simple File Upload 'index.php' Remote Code Execution Vulnerability
-
http://www.securityfocus.com/bid/51234
Joomla! Simple File Upload Arbitrary File Upload Vulnerability
Jump to