Language:
Severity: High
ID: 86655
File Name: joomla_345.nasl
Version: 1.16
Type: remote
Family: CGI abuses
Published: 10/29/2015
Updated: 6/5/2024
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: High
Base Score: 7.3
Temporal Score: 6.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X
CPE: cpe:/a:joomla:joomla%5c%21
Required KB Items: installed_sw/Joomla!, www/PHP, Settings/ParanoidReport
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/22/2015
Vulnerability Publication Date: 10/22/2015
Core Impact
Metasploit (Joomla Content History SQLi Remote Code Execution)
Elliot (Joomla Core SQLi list[select])
CVE: CVE-2015-7297, CVE-2015-7857, CVE-2015-7858, CVE-2015-7859, CVE-2015-7899