CVE-2014-7228
Vulnerability from cvelistv5
Published
2014-11-03 22:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-03T21:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/", "refsource": "MISC", "url": "http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/" }, { "name": "http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html", "refsource": "CONFIRM", "url": "http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html" }, { "name": "https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html", "refsource": "CONFIRM", "url": "https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7228", "datePublished": "2014-11-03T22:00:00", "dateReserved": "2014-09-29T00:00:00", "dateUpdated": "2024-08-06T12:40:19.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB16BDD1-C100-46AD-B0BB-699E32BF7FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"287DD122-A85D-4B55-97AC-5861157A177E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98C4C245-C895-450C-B319-D0A11AA6F4B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"194B27E6-49C4-409F-B727-38E5C904CD3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFFF133F-44AF-46FF-9A62-272D0A10C539\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60787DEA-EA05-411C-BFFB-DB061D28BE9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F24DA6BF-5321-4E54-B2BA-7573CCD2FA01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F968BB79-8712-4C2D-AF77-B4B57862CB30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC7A5257-5617-43CC-AFA8-5FED7FCCFE38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"407C8BD8-B870-43D3-B735-9D7B52B1012A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA936AAF-A6E6-42AE-81D6-FC12BD5F74E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FB51FDA-2080-447C-A57A-B95A1A9741E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"709046EE-05BE-4B74-A364-ECCE4165EAA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACEEFBF9-82AC-425E-ADA7-CA84EBEF69EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16BA879-7B9E-4009-8059-3B7511E912F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01879A02-1248-44D9-A106-4CAED12B3D3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860AF6DE-436A-4051-8730-038FD2B04C4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACEFB738-56D7-4C73-BC13-C62BD9FD90AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FC3C521-D8DF-4111-8074-ADFEC3426396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65365011-7019-430D-BE32-9E0124F27841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A2A21F-C41F-4A30-BA2E-A6DEB761C7EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:2.5.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89D10456-3735-4F8F-A97B-9D8D561BA717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795E7538-038C-42D7-B4A8-BED0F120B605\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC38EBE5-69C4-4F10-9AED-4E7E51B19BA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E760A5AA-299D-47EA-895F-B9CA212D8BAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19CF53BD-6A52-41D3-8BB3-B08AC81C65E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23070D86-E104-4A93-84EA-5B23952B6A0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE739F2A-795E-4721-A36D-BC269A6BC03A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE74090E-8F37-442E-A29C-DE41898291C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ECDCEDF-7FFD-48C4-B655-0E8C03BB36FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6037D413-3356-4801-8886-57D990DC25A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80A2FDC8-9123-49BC-8A2B-719192913172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA80B0B6-590F-4550-9984-BABB24B268F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F36C2F51-7B04-4B57-AC3A-E2B245FE182F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83513309-01CD-411C-82EF-62C1F7F4764F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27BABCB8-916D-452E-8848-B51B3374CE8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD14669F-9C13-46BA-A45B-EC0B4081D105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"370F58E9-AD21-446F-BC29-10F2A448F18E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C7EA5D-CEB8-45C6-A50F-577B02BBD25F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9382E8F4-30E6-473C-92F8-B8A48C28449B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A3ED8A4-60AF-4347-8A4E-41BAF7ED09B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4B4D693-A540-4FB3-B7F9-9746F01B44CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9623DC6-3822-4493-A0CC-C87134799D67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B71C854-FDCA-40C9-BB18-D7947BE81F04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC3861B6-CBD7-438E-A067-AEAEBB6C09B7\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.\"}, {\"lang\": \"es\", \"value\": \"Akeeba Restore (restore.php), utilizado en Joomla! 2.5.4 hasta 2.5.25, 3.x hasta 3.2.5, y 3.3.0 hasta 3.3.4; Akeeba Backup para Joomla! Professional 3.0.0 hasta 4.0.2; Backup Professional para WordPress 1.0.b1 hasta 1.1.3; Solo 1.0.b1 hasta 1.1.2; Admin Tools Core and Professional 2.0.0 hasta 2.4.4; y CMS Update 1.0.a1 hasta 1.0.1, cuando realiza una copia de seguridad o una actualizaci\\u00f3n para un archivo, no elimina par\\u00e1metros de $_GET y $_POST cuando est\\u00e1 limpiando $_REQUEST, pero posteriormente accede a $_GET y $_POST utilizando la funci\\u00f3n getQueryParam, lo que permite a atacantes remotos evadir la codificaci\\u00f3n y ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de un mensaje de comando que extrae un archivo manipulado.\"}]", "id": "CVE-2014-7228", "lastModified": "2024-11-21T02:16:34.053", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-11-03T22:55:08.413", "references": "[{\"url\": \"http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2014-7228\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-11-03T22:55:08.413\",\"lastModified\":\"2024-11-21T02:16:34.053\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.\"},{\"lang\":\"es\",\"value\":\"Akeeba Restore (restore.php), utilizado en Joomla! 2.5.4 hasta 2.5.25, 3.x hasta 3.2.5, y 3.3.0 hasta 3.3.4; Akeeba Backup para Joomla! Professional 3.0.0 hasta 4.0.2; Backup Professional para WordPress 1.0.b1 hasta 1.1.3; Solo 1.0.b1 hasta 1.1.2; Admin Tools Core and Professional 2.0.0 hasta 2.4.4; y CMS Update 1.0.a1 hasta 1.0.1, cuando realiza una copia de seguridad o una actualizaci\u00f3n para un archivo, no elimina par\u00e1metros de $_GET y $_POST cuando est\u00e1 limpiando $_REQUEST, pero posteriormente accede a $_GET y $_POST utilizando la funci\u00f3n getQueryParam, lo que permite a atacantes remotos evadir la codificaci\u00f3n y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un mensaje de comando que extrae un archivo manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB16BDD1-C100-46AD-B0BB-699E32BF7FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"287DD122-A85D-4B55-97AC-5861157A177E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C4C245-C895-450C-B319-D0A11AA6F4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194B27E6-49C4-409F-B727-38E5C904CD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFF133F-44AF-46FF-9A62-272D0A10C539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60787DEA-EA05-411C-BFFB-DB061D28BE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24DA6BF-5321-4E54-B2BA-7573CCD2FA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F968BB79-8712-4C2D-AF77-B4B57862CB30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7A5257-5617-43CC-AFA8-5FED7FCCFE38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"407C8BD8-B870-43D3-B735-9D7B52B1012A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA936AAF-A6E6-42AE-81D6-FC12BD5F74E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB51FDA-2080-447C-A57A-B95A1A9741E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"709046EE-05BE-4B74-A364-ECCE4165EAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEEFBF9-82AC-425E-ADA7-CA84EBEF69EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BA879-7B9E-4009-8059-3B7511E912F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01879A02-1248-44D9-A106-4CAED12B3D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860AF6DE-436A-4051-8730-038FD2B04C4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEFB738-56D7-4C73-BC13-C62BD9FD90AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC3C521-D8DF-4111-8074-ADFEC3426396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65365011-7019-430D-BE32-9E0124F27841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A2A21F-C41F-4A30-BA2E-A6DEB761C7EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:2.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89D10456-3735-4F8F-A97B-9D8D561BA717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795E7538-038C-42D7-B4A8-BED0F120B605\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38EBE5-69C4-4F10-9AED-4E7E51B19BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E760A5AA-299D-47EA-895F-B9CA212D8BAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CF53BD-6A52-41D3-8BB3-B08AC81C65E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23070D86-E104-4A93-84EA-5B23952B6A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE739F2A-795E-4721-A36D-BC269A6BC03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE74090E-8F37-442E-A29C-DE41898291C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECDCEDF-7FFD-48C4-B655-0E8C03BB36FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6037D413-3356-4801-8886-57D990DC25A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A2FDC8-9123-49BC-8A2B-719192913172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA80B0B6-590F-4550-9984-BABB24B268F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F36C2F51-7B04-4B57-AC3A-E2B245FE182F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83513309-01CD-411C-82EF-62C1F7F4764F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BABCB8-916D-452E-8848-B51B3374CE8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD14669F-9C13-46BA-A45B-EC0B4081D105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370F58E9-AD21-446F-BC29-10F2A448F18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C7EA5D-CEB8-45C6-A50F-577B02BBD25F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9382E8F4-30E6-473C-92F8-B8A48C28449B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A3ED8A4-60AF-4347-8A4E-41BAF7ED09B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B4D693-A540-4FB3-B7F9-9746F01B44CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9623DC6-3822-4493-A0CC-C87134799D67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B71C854-FDCA-40C9-BB18-D7947BE81F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3861B6-CBD7-438E-A067-AEAEBB6C09B7\"}]}]}],\"references\":[{\"url\":\"http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.