cve/2016/CVE-2016-9836.md

22 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-9836](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9836)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types.
### POC
#### Reference
- https://github.com/XiphosResearch/exploits/tree/master/Joomraa
#### Github
- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s
- https://github.com/Xcod3bughunt3r/ExploitsTools
- https://github.com/XiphosResearch/exploits
- https://github.com/dr4v/exploits
- https://github.com/shildenbrand/Exploits