### [CVE-2016-9836](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9836) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types. ### POC #### Reference - https://github.com/XiphosResearch/exploits/tree/master/Joomraa #### Github - https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s - https://github.com/Xcod3bughunt3r/ExploitsTools - https://github.com/XiphosResearch/exploits - https://github.com/dr4v/exploits - https://github.com/shildenbrand/Exploits