First published: Wed Feb 13 2013(Updated: )
plugins/system/highlight/highlight.php in Joomla! 3.0.x through 3.0.2 and 2.5.x through 2.5.8 allows attackers to unserialize arbitrary PHP objects to obtain sensitive information, delete arbitrary directories, conduct SQL injection attacks, and possibly have other impacts via the highlight parameter. Note: it was originally reported that this issue only allowed attackers to obtain sensitive information, but later analysis demonstrated that other attacks exist.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =2.5.0 | |
Joomla | =2.5.1 | |
Joomla | =2.5.2 | |
Joomla | =2.5.3 | |
Joomla | =2.5.4 | |
Joomla | =2.5.5 | |
Joomla | =2.5.6 | |
Joomla | =2.5.7 | |
Joomla | =2.5.8 | |
Joomla | =3.0.0 | |
Joomla | =3.0.1 | |
Joomla | =3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1453 is considered a high severity vulnerability due to its ability to allow attackers to unserialize arbitrary PHP objects.
To fix CVE-2013-1453, update Joomla! to version 2.5.9 or higher or 3.0.3 or higher where the vulnerability has been patched.
CVE-2013-1453 affects Joomla! versions 2.5.0 through 2.5.8 and 3.0.0 through 3.0.2.
CVE-2013-1453 can lead to information disclosure, arbitrary directory deletion, and SQL injection attacks.
Yes, CVE-2013-1453 is a PHP vulnerability that allows for the unserialization of arbitrary PHP objects.