First published: Tue Sep 11 2007(Updated: )
Unrestricted file upload vulnerability in the Restaurante (com_restaurante) component for Joomla! allows remote attackers to upload and execute arbitrary PHP code via an upload action specifying a filename with a double extension such as .php.jpg, which creates an accessible file under img_original/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Detodas Restaurante Component For Joomla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4817 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2007-4817, update the Restaurante component for Joomla! to a version that eliminates the unrestricted file upload functionality.
Attackers can exploit CVE-2007-4817 to upload and execute malicious PHP scripts on the server.
CVE-2007-4817 affects Joomla! sites using the Detodas Restaurante component that do not have mitigations in place.
The impact of CVE-2007-4817 on a Joomla! website can result in unauthorized access and control of the server where the component is installed.