Miggo Logo

CVE-2015-8566:
Joomla! Framework Remote Code Injection Vulnerability

7.5

CVSS Score

Basic Information

EPSS Score
0.82281%
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
joomla/sessioncomposer< 1.3.11.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper neutralization of browser information (CWE-74) stored in session values. The Joomla security advisory explicitly states browser information wasn't filtered during session storage. Session initialization typically handles User-Agent headers, and PHP's unserialize() operation on attacker-controlled data leads to object injection. The patched version 1.3.1 would have added filtering in this initialization path, aligning with the vulnerability pattern of unsafe session data handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** S*ssion p**k*** *.x ***or* *.*.* *or Jooml*! *r*m*work *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry *o** vi* unsp**i*i** s*ssion v*lu*s.

Reasoning

T** vuln*r**ility st*ms *rom improp*r n*utr*liz*tion o* *rows*r in*orm*tion (*W*-**) stor** in s*ssion v*lu*s. T** Jooml* s**urity **visory *xpli*itly st*t*s *rows*r in*orm*tion w*sn't *ilt*r** *urin* s*ssion stor***. S*ssion initi*liz*tion typi**lly