CVE-2014-7228

EUVD-2014-7100
Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
joomlajoomla\!
2.5.4
joomlajoomla\!
2.5.5
joomlajoomla\!
2.5.6
joomlajoomla\!
2.5.7
joomlajoomla\!
2.5.8
joomlajoomla\!
2.5.9
joomlajoomla\!
2.5.10
joomlajoomla\!
2.5.11
joomlajoomla\!
2.5.12
joomlajoomla\!
2.5.13
joomlajoomla\!
2.5.14
joomlajoomla\!
2.5.15
joomlajoomla\!
2.5.16
joomlajoomla\!
2.5.17
joomlajoomla\!
2.5.18
joomlajoomla\!
2.5.19
joomlajoomla\!
2.5.20
joomlajoomla\!
2.5.21
joomlajoomla\!
2.5.22
joomlajoomla\!
2.5.23
joomlajoomla\!
2.5.24
joomlajoomla\!
2.5.25
joomlajoomla\!
3.0.0
joomlajoomla\!
3.0.1
joomlajoomla\!
3.0.2
joomlajoomla\!
3.0.3
joomlajoomla\!
3.0.4
joomlajoomla\!
3.1.0
joomlajoomla\!
3.1.1
joomlajoomla\!
3.1.2
joomlajoomla\!
3.1.3
joomlajoomla\!
3.1.4
joomlajoomla\!
3.1.5
joomlajoomla\!
3.1.6
joomlajoomla\!
3.2.0
joomlajoomla\!
3.2.1
joomlajoomla\!
3.2.2
joomlajoomla\!
3.2.3
joomlajoomla\!
3.2.4
joomlajoomla\!
3.2.5
joomlajoomla\!
3.3.0
joomlajoomla\!
3.3.1
joomlajoomla\!
3.3.2
joomlajoomla\!
3.3.3
joomlajoomla\!
3.3.4
𝑥
= Vulnerable software versions
Common Weakness Enumeration