vendor:
NoNumber Framework Joomla! Plugin
by:
jdc
7.5
CVSS
HIGH
Local File Inclusion, Open Proxy/Open cURL/Shell Upload
94, 78
CWE
Product Name: NoNumber Framework Joomla! Plugin
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2011
NoNumber Framework Joomla! Plugin Multiple Vulnerabilities
The nnframework plugin by NoNumber! contains multiple vulnerabilities. This plugin is shipped with all NoNumber extensions. Local File Inclusion can be done by passing the file parameter with the LFI payload. Open Proxy/Open cURL/Shell Upload can be done by passing the url parameter with the remote host and url_options[CURLOPT_POSTDATA] parameter with the post data. It is also possible to gain remote access by setting up a remote page that sets the cookie, forcing the victim site to write a cookie file, POST a single variable containing shellcode to the victim site and executing the shellcode.
Mitigation:
Update to the latest version of the NoNumber Framework Joomla! Plugin.