Korean
<< Back
VID 21972
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Joomla! program is vulnerable to a remote code execution vulnerability via the 'PEAR.php' script. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.0.11 or PHP version 4.4.0 and earlier versions and version 5.0.5 and earlier versions could allow a remote attacker to execute arbitrary PHP code on the affected system, caused by a vulnerability in the 'PEAR.php' script or extract() or import_request_variables() function. If the register_globals is enabled, a remote attacker could send a multipart/form-data POST request with a specially-crafted file upload field to execute arbitrary PHP code on a affected system.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0647.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0934.html
http://www.php.net/release_4_4_1.php
http://www.frsirt.com/english/advisories/2005/2254
http://secunia.com/advisories/17371
http://www.hardened-php.net/globals-problem
http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml
https://rhn.redhat.com/errata/RHSA-2005-831.html
https://rhn.redhat.com/errata/RHSA-2005-838.html
http://www.securityfocus.com/archive/1/415290
http://www.securityfocus.com/archive/1/415291

* Platforms Affected:
Joomla! versions prior to 1.0.11
PHP version 4.4.0 and earlier versions
PHP version 5.0.5 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Joomla! (1.0.11 or later), available from the Joomla! Web site at http://www.joomla.org/component/option,com_frontpage/Itemid,1/

-- OR --

Upgrade to the latest version of PHP (4.4.1 or later, or 5.0.6 or later), available from the PHP Web site at http://www.php.net/downloads.php
Related URL CVE-2005-3390 (CVE)
Related URL 15250,19749 (SecurityFocus)
Related URL 22920 (ISS)