Vulnerability Name: | CCN-109222 | ||||||
Published: | 2015-12-18 | ||||||
Updated: | 2015-12-18 | ||||||
Summary: | Joomla! could allow a remote attacker to execute arbitrary code on the system, caused by the failure to properly filter browser information while session values are saved in the database. An attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: XF Type: UNKNOWN joomla-browserinfo-code-exec(109222) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-18-2015] Source: CCN Type: Joomla! Web site Joomla! 3.4.6 Released | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |