⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2015-8562Improper Input Validation in Joomla !

Severity
7.5HIGHNVD
EPSS
92.9%
top 0.22%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedDec 16
Latest updateMay 14

Description

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDjoomla/joomla_!95 versions+94

🔴Vulnerability Details

3
GHSA
GHSA-pccq-v233-rx3q: Joomla! 12022-05-14
CVEList
CVE-2015-8562: Joomla! 12015-12-16
VulnCheck
Joomla! Joomla! Improper Input Validation2015

💥Exploits & PoCs

4
Exploit-DB
Joomla! 1.5 < 3.4.6 - Object Injection 'x-forwarded-for' Header Remote Code Execution2015-12-18
Exploit-DB
Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution2015-12-15
Nuclei
Joomla HTTP Header Unauthenticated - Remote Code Execution
Metasploit
Joomla HTTP Header Unauthenticated Remote Code Execution

🕵️Threat Intelligence

2
Unit42
Network Attack Trends: Internet of Threats (November 2020-January 2021)2021-04-12
Unit42
Network Attack Trends: Internet of Threats (November 2020-January 2021)2021-04-12
CVE-2015-8562 — Improper Input Validation in Joomla ! | cvebase