Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-8869

EPSS 91.92% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-8869

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Joomla! 提权漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Joomla!是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla! 3.6.4之前的版本中的Users组件中的controllers/user.php文件中的UsersModelRegistration类中的‘register’方法存在安全漏洞。远程攻击者可通过错误使用未过滤的数据利用该漏洞提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-8869

#POC DescriptionSource LinkShenlong Link
1Source code: https://github.com/XiphosResearch/exploits/tree/master/Joomraahttps://github.com/sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870POC Details
2Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)https://github.com/rustyJ4ck/JoomlaCVE20168869POC Details
3cve-2016-8869https://github.com/cved-sources/cve-2016-8869POC Details
4Source code: https://github.com/XiphosResearch/exploits/tree/master/Joomraahttps://github.com/zugetor/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-8869

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-11-04 · 20 CVEs total

CVE-2016-9177Spark 目录遍历漏洞
CVE-2016-9190Pillow 安全漏洞
CVE-2016-9189Pillow 安全漏洞
CVE-2016-9188Moodle CMS 跨站脚本漏洞
CVE-2016-9187Moodle 任意文件上传漏洞
CVE-2016-9186Moodle 任意文件上传漏洞
CVE-2016-9185OpenStack Heat 安全漏洞
CVE-2016-9184OIC Exponent CMS 安全漏洞
CVE-2016-9183OIC Exponent CMS 安全漏洞
CVE-2016-9182OIC Exponent CMS 安全漏洞
CVE-2016-8576QEMU 资源管理错误漏洞
CVE-2016-8910QEMU 资源管理错误漏洞
CVE-2016-8909QEMU 资源管理错误漏洞
CVE-2016-8870Joomla! 安全漏洞
CVE-2016-8669QEMU 数字错误漏洞
CVE-2016-8668QEMU 安全漏洞
CVE-2016-8667QEMU 安全漏洞
CVE-2016-8578QEMU 安全漏洞
CVE-2016-8577QEMU 内存泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2016-8869

No comments yet


Leave a comment