Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5736 PoC — SSRF in AdmirorFrames Joomla! Extension

Source
Associated Vulnerability
Title:SSRF in AdmirorFrames Joomla! Extension (CVE-2024-5736)
Description:Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost. This issue affects AdmirorFrames: before 5.0.
Description
AdmirorFrames Joomla! Extension < 5.0 - Server-Side Request Forgery
Readme
# CVE-2024-5736
AdmirorFrames Joomla! Extension < 5.0 - Server-Side Request Forgery

## Timeline
- Vulnerability reported to vendor: 26.01.2024
- New fixed 5.0 version released: 06.06.2024
- Public disclosure: 28.06.2024

## Description

Server-Side Request Forgery in AdmirorFrames Joomla! Extension in `afGdStream.php` file which uses value of `$_GET['src_file']` variable directly as a parameter to `imagecreatefrompng` function. 

The vulnerability exists in `afGdStream.php` file:
```
if ($_GET['src_file'] == "")
    exit;

    $src_file = urldecode($_GET['src_file']);
    $bgcolor = $_GET['bgcolor'];
    $colorize = $_GET['colorize'];
    $ratio = $_GET['ratio'];

    // Create src_img
    if (preg_match("/png/i", $src_file))
    {
        @$src_img = imagecreatefrompng($src_file);
    }
```

This issue was caused by direct usage of `$_GET['src_file']` variable as a parameter to `imagecreatefrompng` function. This problem has been fixed in AdmirorFrames Joomla! Extension at version 5.0.

## Affected versions
< 5.0 

## Advisory
Update AdmirorFrames Joomla! Extension to version 5.0 or newer.

### References
* https://github.com/vasiljevski/admirorframes/issues/3
* https://cert.pl/en/posts/2024/06/CVE-2024-5735/
* https://cert.pl/posts/2024/06/CVE-2024-5735/
* https://nvd.nist.gov/vuln/detail/CVE-2024-5736
File Snapshot

[4.0K] /data/pocs/b527795011d9bdbc83644de3f82e5bcbcdb41f82 ├── [ 34K] LICENSE └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →