Vulnerability Details : CVE-2014-7228
Public exploit exists!
Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.
Vulnerability category: Execute code
Products affected by CVE-2014-7228
- cpe:2.3:a:joomla:joomla\!:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.24:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.23:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.21:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.22:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.20:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.25:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:2.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7228
95.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-7228
-
Joomla Akeeba Kickstart Unserialize Remote Code Execution
Disclosure Date: 2014-09-29First seen: 2020-04-26exploit/unix/webapp/joomla_akeeba_unserializeThis module exploits a vulnerability found in Joomla! through 2.5.25, 3.2.5 and earlier 3.x versions and 3.3.0 through 3.3.4 versions. The vulnerability affects the Akeeba component, which is responsible for Joomla! updates. Nevertheless it is worth to note that this
CVSS scores for CVE-2014-7228
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-7228
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7228
-
http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html
[20140903] - Core - Remote File InclusionVendor Advisory
-
http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/
Joomla! 3.3.4 / Akeeba Kickstart – Remote Code Execution (CVE-2014-7228) | Reiners' WeblogExploit
-
https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html
Security update, September 2014 - Akeeba LtdVendor Advisory
Jump to