vendor:
Joomla Simple Photo Gallery
by:
CrashBandicot @DosPerl
8.8
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: Joomla Simple Photo Gallery
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:apptha:joomla_simple_photo_gallery
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2015
Joomla Simple Photo Gallery – Arbitrary File Upload
A vulnerability in Joomla Simple Photo Gallery allows an attacker to upload arbitrary files to the server. This is due to the lack of proper input validation in the uploadFile.php file, which allows an attacker to upload a malicious file to the server by setting the jpath parameter to ../../../../ and submitting a file in the uploadfile parameter. This can be exploited to execute arbitrary PHP code on the server.
Mitigation:
Input validation should be implemented to prevent malicious files from being uploaded to the server.