Skip to content

Access Control: Joomla! CMS \<=3.4.6 - Remote Code Execution

Identifier: rusty_joomla

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

Joomla! CMS 3.0.0 through the 3.4.6 release contains an unauthenticated PHP object injection that leads to remote code execution.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  rusty_joomla:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.