Vulnerability Name:

CVE-2014-7228 (CCN-96795)

Assigned:2014-09-30
Published:2014-09-30
Updated:2016-05-09
Summary:Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-310
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2014-7228

Source: CONFIRM
Type: Vendor Advisory
http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html

Source: MISC
Type: Exploit
http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/

Source: CCN
Type: BID-70199
Multiple Akeeba Products 'restore.php' Remote File Include Vulnerability

Source: XF
Type: UNKNOWN
akeeba-cve20147228-file-include(96795)

Source: CCN
Type: Packet Storm Security [10-21-2014]
Joomla Akeeba Kickstart Unserialize Remote Code Execution

Source: CCN
Type: Akeeba Backup Web site
Security update, September 2014

Source: CONFIRM
Type: Vendor Advisory
https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [10-21-2014]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:joomla:joomla!:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.9:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.10:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.11:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.12:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.13:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.14:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.15:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.17:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.18:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.19:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.20:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.21:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.22:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.23:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.24:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:2.5.25:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:joomla:joomla!:3.3.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    joomla joomla! 2.5.4
    joomla joomla! 2.5.5
    joomla joomla! 2.5.6
    joomla joomla! 2.5.7
    joomla joomla! 2.5.8
    joomla joomla! 2.5.9
    joomla joomla! 2.5.10
    joomla joomla! 2.5.11
    joomla joomla! 2.5.12
    joomla joomla! 2.5.13
    joomla joomla! 2.5.14
    joomla joomla! 2.5.15
    joomla joomla! 2.5.16
    joomla joomla! 2.5.17
    joomla joomla! 2.5.18
    joomla joomla! 2.5.19
    joomla joomla! 2.5.20
    joomla joomla! 2.5.21
    joomla joomla! 2.5.22
    joomla joomla! 2.5.23
    joomla joomla! 2.5.24
    joomla joomla! 2.5.25
    joomla joomla! 3.0.0
    joomla joomla! 3.0.1
    joomla joomla! 3.0.2
    joomla joomla! 3.0.3
    joomla joomla! 3.0.4
    joomla joomla! 3.1.0
    joomla joomla! 3.1.1
    joomla joomla! 3.1.2
    joomla joomla! 3.1.3
    joomla joomla! 3.1.4
    joomla joomla! 3.1.5
    joomla joomla! 3.1.6
    joomla joomla! 3.2.0
    joomla joomla! 3.2.1
    joomla joomla! 3.2.2
    joomla joomla! 3.2.3
    joomla joomla! 3.2.4
    joomla joomla! 3.2.5
    joomla joomla! 3.3.0
    joomla joomla! 3.3.1
    joomla joomla! 3.3.2
    joomla joomla! 3.3.3
    joomla joomla! 3.3.4