Vigil@nce - Joomla com_hotornot2 : exécution de code PHP
December 2013 by Vigil@nce
Vigil@nce - Joomla com_hotornot2: PHP code execution
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can upload a PHP file via Joomla com_hotornot2, in
order to execute PHP code.
– Impacted products: Joomla Extensions
– Severity: 2/4
– Creation date: 05/12/2013
DESCRIPTION OF THE VULNERABILITY
The Joomla com_hotornot2 extension is used to vote for an image.
It can be used to upload a file. However, a PHP file can be
uploaded on the server, and then executed.
An attacker can therefore upload a PHP file via Joomla
com_hotornot2, in order to execute PHP code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Joomla-com-hotornot2-PHP-code-execution-13879