Joomla! 1.5 < 3.4.5 RCE
Impact: High
Description
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation. OWASP
Recommendation
Upgrade Joomla! to the latest stable version.
References
- Joomla!
- OWASP: Command Injection
- CVE-2015-8562
- OWASP 2017-A9
- OWASP 2021-A6
- CWE-77
- OWASP 2017-A1
- OWASP 2021-A3
- CWE-20
👉 You might also like:
Joomla! 'J2Store < 3.3.7' SQL Injection - CVE-2019-9184
Joomla! Component Com_contenthistory SQLI - CVE-2015-7858, CVE-2015-7857, CVE-2015-7297
Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 'alias' SQLI - CVE-2018-6583
Drupal 'Drupalgeddon2' Remote Code Execution - CVE-2018-7600
Last updated on September 05, 2021