📜 ⬆️ ⬇️

Vulnerability in Akeeba Backup and Joomla!

Description


Vulnerability allows a remote attacker to extract an archive stored somewhere remotely on the attacked site while unpacking a backup or installing updates, depending on the settings. The existence of a vulnerability does not allow using it. An attacker should attack precisely at the time when the backup archive is extracted or the Joomla! Update package is being installed.

Software Affected Software Versions




Operating principle


The system for restoring backups and service packs uses the restore.php file. In order to protect against influence from outside, before unpacking, a restoration.php file is created containing the authentication key that is used to sign commands to restore.php. Unsigned commands restore.php rejects. restore.php accepts the _only_ commands when the restoration.php file exists. The restoration.php file is automatically deleted immediately after the operation of extracting the archive or unpacking the update package is completed.

Vulnerability allows you to bypass encryption and send arbitrary commands to restore.php. An attacker can send a specially formed command that allows unpacking a remote archive to your site.
')
Of course, the vulnerability requires the permission of the URL in the fopen () function and writing to disk on the attacked machine.

Vulnerability elimination


Source: https://habr.com/ru/post/238745/


All Articles