8.1
CVSSv3

CVE-2016-8870

Published: 04/11/2016 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! prior to 3.6.4, when registration has been disabled, allows remote malicious users to create user accounts by leveraging failure to check the Allow User Registration configuration setting.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

joomla joomla!

Exploits

Source: githubcom/XiphosResearch/exploits/tree/master/Joomraa While analysing the recent Joomla exploit in com_users:userregister we came across a problem with the upload whitelisting They don't allow files containing <?php, or with the extensions php and phtml, but they do allow <?= and pht files, which works out of the box on ...

Github Repositories

OWASP Giới thiệu OWASP là một tổ chức phi lợi nhuận cung cấp một framework đầy đủ về what, why, when, where và how cho việc đánh giá, kiểm tra các ứng dụng web Web Application Security Testing 41 Testing Checklist 42 OTG-INFO (Information Gathering) 421 OTG-INFO-001 (Conduct Search Engine Discovery

Sudo Vulnerability (CVE-2019-14287) this is demostration on CVE-2019-14287 vulnerability Here is everything you need to know about the Sudo vulnerability, how it works, and how to handle the vulnerable Sudo component, if you find that you are currently at risk Joomla Account Creation and Privilege Escalation CVE:2016-8869 / 2016-8870 CVE Reference : CVE-2016-8869, CVE-2016-8

cve-2016-8870

CVE-2016-8870 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2016-8870 Image author: githubcom/Medicean/VulApps/tree/master/j/joomla/1

Mass exploitation tool in python

Welcome to Google Explorer Special thanks to ArchStrike and BlackArch for supporting ;) [+] Google Mass Explorer (PYTHON 36) This is a automated robot for google search engine and a massive exploitation tool Make a google search and run a specific --plugin on the results The dork you use is the key for success ;) The options can be listed with --help parameter Usage: go

Mass exploitation tool in python

Welcome to Google Explorer Special thanks to ArchStrike and BlackArch for supporting ;) [+] Google Mass Explorer (PYTHON 36) This is a automated robot for google search engine and a massive exploitation tool Make a google search and run a specific --plugin on the results The dork you use is the key for success ;) The options can be listed with --help parameter Usage: go

Recent Articles

Hackers hustle to hassle un-patched Joomla! sites
The Register • Darren Pauli • 02 Nov 2016

If you didn't patch, you've probably been p0wned already

Attackers are already exploiting a dangerous privileged account creation hole in the Joomla! content management system attempting, with attempts made on about 30,000 sites in the days days after a patch for the flaw landed. The vulnerability, which allows anyone to create privileged accounts on Joomla! sites, was first flagged in a scant Joomla! pre-release notice warning administrators to prepare for a then un-described but critical patch. At the time The Register warned the then mysterious fla...

Joomla! squashes critical privileged account creation holes
The Register • Darren Pauli • 27 Oct 2016

Borked two factor authentication also fixed

Joomla! has revealed it's patched twin critical flaws allowing attackers to bypass rules and create elevated privilege accounts. Project staff warned of the looming patch this week asking administrators to prepare for the patch and apply it immediately. The Joomla! security strike team said at the time only that a hole impacted the content management system core and was a "very important" fix. Joomla! has been downloaded more than 75 million times and runs on big ticket sites including McDonalds...