![]() ![]() ![]() ![]() For example, it can be used through the Joomla CMS login form which allows attackers to execute code on the underlying database of the web. It is a PHP object injection that, within certain situations, can lead to remote code execution (RCE). The vulnerability is easy to exploit and the code of attack proof of concept was published online. It affects all versions of Joomla released from late September 2012 to mid-December 2015 from 3.0.0 to 3.4.6. The bug has been discovered by Hacktive Security Italian security researcher Alessandro Groppo. Reports of a flaw in older versions of the Joomla content management system (CMS), a common web-based software for the creation and management of websites, was posted online last week.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |