mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
22 lines
1.0 KiB
Markdown
22 lines
1.0 KiB
Markdown
![]() |
### [CVE-2016-9836](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9836)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/XiphosResearch/exploits/tree/master/Joomraa
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s
|
||
|
- https://github.com/Xcod3bughunt3r/ExploitsTools
|
||
|
- https://github.com/XiphosResearch/exploits
|
||
|
- https://github.com/dr4v/exploits
|
||
|
- https://github.com/shildenbrand/Exploits
|
||
|
|