vendor:
GMapFP
by:
ThelastVvV
7.5
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: GMapFP
Affected Version From: J3.30pro
Affected Version To: J3.30pro
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu
2020
Joomla! Component GMapFP 3.30 – Arbitrary File Upload
The Joomla Gmapfp Components 3.x is allowing remote attackers to upload arbitrary files upload/shell upload due to the issues of unrestricted file uploads. An attacker can bypass the restriction by uploading files with double extensions such as file.php.png, file2.php.jpeg, file3.html.jpg, and file3.txt.jpg. The uploaded files can be accessed via the directory path http://127.0.0.1/images/gmapfp/file.php or http://127.0.0.1//images/gmapfp/file.php.png.
Mitigation:
Restrict file uploads to only allow certain file types and extensions, and ensure that the uploaded files are stored outside of the web root directory.