CERT-In Vulnerability Note
CIVN-2015-0316
Remote Code Execution vulnerability in Joomla
Original Issue Date:December 29, 2015
Severity Rating: HIGH
Software Affected
- Joomla! CMS versions 1.5.0 through 3.4.6
Overview
A vulnerability has been reported in Joomla!, which could be exploited by remote attacker to execute arbitrary code.
Description
This vulnerability exists due to a use after free flaw in session deserializer in PHP while calling php_var_unserialize().
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Upgrade to latest version as mentioned at
https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html
Vendor Information
Joomla!
https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html
References
Joomla!
https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|