Vulnerability Description
uploadimg.php in the Expose RC35 and earlier (com_expose) component for Joomla! sends an error message but does not exit when it detects an attempt to upload a non-JPEG file, which allows remote attackers to upload and execute arbitrary PHP code in the img/ folder.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Expose | <= rc35 |
References
- http://osvdb.org/41262
- http://www.attrition.org/pipermail/vim/2007-July/001717.html
- http://www.securityfocus.com/bid/24958
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35488
- https://www.exploit-db.com/exploits/4194
- http://osvdb.org/41262
- http://www.attrition.org/pipermail/vim/2007-July/001717.html
- http://www.securityfocus.com/bid/24958
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35488
- https://www.exploit-db.com/exploits/4194
FAQ
What is CVE-2007-3932?
CVE-2007-3932 is a vulnerability with a CVSS score of 7.5 (HIGH). uploadimg.php in the Expose RC35 and earlier (com_expose) component for Joomla! sends an error message but does not exit when it detects an attempt to upload a non-JPEG file, which allows remote attac...
How severe is CVE-2007-3932?
CVE-2007-3932 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3932?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Expose.