CIS CYBER SECURITY ADVISORIES
MS-ISAC CYBER SECURITY ADVISORY NUMBER:
Joomla CMS is Vulnerable to Arbitrary File Upload
Joomla! is an open source content management system for websites. Joomla! Content Management System (CMS) is prone to a vulnerability that could allow an attacker to upload arbitrary files, which could completely compromise the website running the Joomla! CMS. Successful exploitation could allow an attacker to control the website; view, change, or delete data; or perform a defacement.
- Joomla! versions prior to 2.5.14 and 3.1.5
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: N/A
Joomla! Content Management System (CMS) is prone to a vulnerability that allows attackers to upload arbitrary files bypassing file type upload restrictions. This is due to the failure of properly validating '.php' file extensions being uploaded. Specifically, this issue affects the 'administrator/components/com_media/helpers/media.php' script. The 'media.php' page is used for managing media files or folders.
An attacker can exploit this vulnerability by crafting a malicious file and uploading it to the web server through the compromised application. Successful exploitation could allow an attacker to control the website; view, change, or delete data; or perform a defacement.
We recommend the following actions be taken:
- Update vulnerable systems running Joomla! immediately after appropriate testing.
- Confirm that the operating system and all other applications on the system are updated with the most recent patches.
- Unless there is a business need, do not allow for the uploading of files using the website.
- If uploading of files is necessary, consider restricting file permissions to upload to directories that prevent execution of files.
- Deploy NIDS to detect and block attacks and anomalous activity such as requests containing suspicious URI sequences.
- Run all software as a non-privileged user with minimal access rights.