cve-2011-5004
Vulnerability from cvelistv5
Published
2011-12-25 01:00
Modified
2024-08-07 00:23
Severity ?
EPSS score ?
Summary
Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ohloh.net/p/3417/commits/145749116" }, { "name": "77371", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77371" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=342" }, { "name": "50823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50823" }, { "name": "47036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ohloh.net/p/3417/commits/145749116" }, { "name": "77371", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77371" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=342" }, { "name": "50823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50823" }, { "name": "47036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ohloh.net/p/3417/commits/145749116", "refsource": "CONFIRM", "url": "http://www.ohloh.net/p/3417/commits/145749116" }, { "name": "77371", "refsource": "OSVDB", "url": "http://www.osvdb.org/77371" }, { "name": "http://www.vulnerability-lab.com/get_content.php?id=342", "refsource": "MISC", "url": "http://www.vulnerability-lab.com/get_content.php?id=342" }, { "name": "50823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50823" }, { "name": "47036", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47036" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5004", "datePublished": "2011-12-25T01:00:00", "dateReserved": "2011-12-24T00:00:00", "dateUpdated": "2024-08-07T00:23:39.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.1\", \"matchCriteriaId\": \"34FFE454-F543-4C5E-A0C2-66C3AE55D11C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99E7AAD-7334-42C2-856E-4BE0ABBED097\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CBCDEBA-EC87-4671-B8DF-F2EB38FB1EFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2AFD198-6B30-4991-8873-FBE32BBD4E34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"314C5956-E3AE-469E-AE2B-CDCCF8661870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fabrikar:com_fabrikar:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"557F950F-8D8E-4384-8233-A3E3193C065D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:joomla:joomla\\\\!:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AC7400C-F6AF-4B5E-A34B-0222F94DCC46\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de subida no restringida de ficheros en models/importcsv.php en el componente Fabrik (com_fabrik) anterior a v2.1.1 para Joomla! permite a atacantes remotos con privilegios Manager ejecutar c\\u00f3digo de su elecci\\u00f3n al subir un fichero con una extensi\\u00f3n ejecutable, accediendo posteriormente mediante una petici\\u00f3n directa del fichero en un directorio no especificado.\"}]", "id": "CVE-2011-5004", "lastModified": "2024-11-21T01:33:24.633", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-12-25T01:55:04.490", "references": "[{\"url\": \"http://secunia.com/advisories/47036\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ohloh.net/p/3417/commits/145749116\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/77371\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/50823\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vulnerability-lab.com/get_content.php?id=342\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/47036\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ohloh.net/p/3417/commits/145749116\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/77371\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/50823\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vulnerability-lab.com/get_content.php?id=342\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-5004\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-12-25T01:55:04.490\",\"lastModified\":\"2024-11-21T01:33:24.633\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de subida no restringida de ficheros en models/importcsv.php en el componente Fabrik (com_fabrik) anterior a v2.1.1 para Joomla! permite a atacantes remotos con privilegios Manager ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.1\",\"matchCriteriaId\":\"34FFE454-F543-4C5E-A0C2-66C3AE55D11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99E7AAD-7334-42C2-856E-4BE0ABBED097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBCDEBA-EC87-4671-B8DF-F2EB38FB1EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AFD198-6B30-4991-8873-FBE32BBD4E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C5956-E3AE-469E-AE2B-CDCCF8661870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fabrikar:com_fabrikar:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557F950F-8D8E-4384-8233-A3E3193C065D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:joomla:joomla\\\\!:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC7400C-F6AF-4B5E-A34B-0222F94DCC46\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/47036\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ohloh.net/p/3417/commits/145749116\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/77371\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/50823\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vulnerability-lab.com/get_content.php?id=342\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/47036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ohloh.net/p/3417/commits/145749116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/77371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/50823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vulnerability-lab.com/get_content.php?id=342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.