VID |
21972 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Joomla! program is vulnerable to a remote code execution vulnerability via the 'PEAR.php' script. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.0.11 or PHP version 4.4.0 and earlier versions and version 5.0.5 and earlier versions could allow a remote attacker to execute arbitrary PHP code on the affected system, caused by a vulnerability in the 'PEAR.php' script or extract() or import_request_variables() function. If the register_globals is enabled, a remote attacker could send a multipart/form-data POST request with a specially-crafted file upload field to execute arbitrary PHP code on a affected system.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0647.html http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0934.html http://www.php.net/release_4_4_1.php http://www.frsirt.com/english/advisories/2005/2254 http://secunia.com/advisories/17371 http://www.hardened-php.net/globals-problem http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml https://rhn.redhat.com/errata/RHSA-2005-831.html https://rhn.redhat.com/errata/RHSA-2005-838.html http://www.securityfocus.com/archive/1/415290 http://www.securityfocus.com/archive/1/415291
* Platforms Affected: Joomla! versions prior to 1.0.11 PHP version 4.4.0 and earlier versions PHP version 5.0.5 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Joomla! (1.0.11 or later), available from the Joomla! Web site at http://www.joomla.org/component/option,com_frontpage/Itemid,1/
-- OR --
Upgrade to the latest version of PHP (4.4.1 or later, or 5.0.6 or later), available from the PHP Web site at http://www.php.net/downloads.php |
Related URL |
CVE-2005-3390 (CVE) |
Related URL |
15250,19749 (SecurityFocus) |
Related URL |
22920 (ISS) |
|