7.5
CVSSv2

CVE-2014-7228

Published: 03/11/2014 Updated: 09/05/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Akeeba Restore (restore.php), as used in Joomla! 2.5.4 up to and including 2.5.25, 3.x up to and including 3.2.5, and 3.3.0 up to and including 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 up to and including 4.0.2; Backup Professional for WordPress 1.0.b1 up to and including 1.1.3; Solo 1.0.b1 up to and including 1.1.2; Admin Tools Core and Professional 2.0.0 up to and including 2.4.4; and CMS Update 1.0.a1 up to and including 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote malicious users to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

joomla joomla\\! 2.5.4

joomla joomla\\! 2.5.11

joomla joomla\\! 2.5.13

joomla joomla\\! 2.5.18

joomla joomla\\! 2.5.21

joomla joomla\\! 3.0.2

joomla joomla\\! 3.0.4

joomla joomla\\! 3.1.6

joomla joomla\\! 3.2.1

joomla joomla\\! 3.3.0

joomla joomla\\! 3.3.2

joomla joomla\\! 2.5.5

joomla joomla\\! 2.5.6

joomla joomla\\! 2.5.7

joomla joomla\\! 2.5.8

joomla joomla\\! 2.5.9

joomla joomla\\! 2.5.23

joomla joomla\\! 2.5.24

joomla joomla\\! 2.5.25

joomla joomla\\! 3.0.0

joomla joomla\\! 3.2.2

joomla joomla\\! 3.2.3

joomla joomla\\! 3.2.4

joomla joomla\\! 3.2.5

joomla joomla\\! 2.5.10

joomla joomla\\! 2.5.12

joomla joomla\\! 2.5.20

joomla joomla\\! 2.5.22

joomla joomla\\! 3.0.1

joomla joomla\\! 3.0.3

joomla joomla\\! 3.1.5

joomla joomla\\! 3.2.0

joomla joomla\\! 3.3.1

joomla joomla\\! 3.3.3

joomla joomla\\! 2.5.14

joomla joomla\\! 2.5.15

joomla joomla\\! 2.5.16

joomla joomla\\! 2.5.17

joomla joomla\\! 3.1.0

joomla joomla\\! 3.1.1

joomla joomla\\! 3.1.2

joomla joomla\\! 3.1.3

joomla joomla\\! 3.1.4

joomla joomla\\! 3.3.4

joomla joomla\\! 2.5.19

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'rex/zip' require 'json' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer::HT ...