CVE-2016-9836Improper Access Control in Joomla !

Severity
9.8CRITICALNVD
EPSS
0.4%
top 40.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 5
Latest updateMay 17

Description

The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDjoomla/joomla_!3.6.4

🔴Vulnerability Details

2
GHSA
GHSA-43p3-cf56-rpqr: The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 32022-05-17
CVEList
CVE-2016-9836: The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 32016-12-05

💬Community

1
Bugzilla
CVE-2014-9836 ImageMagick: crash in xpm file handling2016-06-07
CVE-2016-9836 — Improper Access Control in Joomla ! | cvebase