Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
Advisories
Source ID Title
EUVD EUVD EUVD-2010-1461 Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T01:21:19.218Z

Reserved: 2010-04-15T00:00:00

Link: CVE-2010-1433

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-21T23:15:09.497

Modified: 2024-11-21T01:14:24.393

Link: CVE-2010-1433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.