Joomla! JCE Component "name" Arbitrary File Upload Vulnerability

SECUNIA ADVISORY ID:
SA47190

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47190/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47190

RELEASE DATE:
2011-12-09
DESCRIPTION:
A vulnerability has been discovered in the JCE component for Joomla!,
which can be exploited by malicious users to compromise a vulnerable
system.

The vulnerability is caused due to the
editor/extensions/browser/file.php script not properly validating
uploaded files, which can be exploited to execute arbitrary PHP code
by uploading a PHP file with e.g. an appended ".gif" file extension.

Successful exploitation requires "Author" privileges.

The vulnerability is confirmed in version 2.0.17. Prior versions may
also be affected.

SOLUTION:
Update to version 2.0.19.

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

Additional information provided by Secunia Research.

ORIGINAL ADVISORY:
JCE:
http://www.joomlacontenteditor.net/news/item/jce-2018-released?category_id=32

RECENT ARTICLE

RECENT POST