Skip to content

Access Control: Joomla! CMS \<=3.4.6 - Remote Code Execution

Identifier: rusty_joomla

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Joomla! CMS 3.0.0 through the 3.4.6 release contains an unauthenticated PHP object injection that leads to remote code execution.

How we test: We test for PHP object injection vulnerabilities in Joomla CMS by injecting serialized PHP objects and analyzing responses to detect if object deserialization leads to remote code execution.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  rusty_joomla:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.