Description
plugins/system/highlight/highlight.php in Joomla! 3.0.x through 3.0.2 and 2.5.x through 2.5.8 allows attackers to unserialize arbitrary PHP objects to obtain sensitive information, delete arbitrary directories, conduct SQL injection attacks, and possibly have other impacts via the highlight parameter. Note: it was originally reported that this issue only allowed attackers to obtain sensitive information, but later analysis demonstrated that other attacks exist.
Exploits (1)
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
http://developer.joomla.org/security/news/548-20130201-core-information-disclosure.html
Exploit x_refsource_misc
http://karmainsecurity.com/analysis-of-the-joomla-php-object-injection-vulnerability
Various Sources x_refsource_misc
http://karmainsecurity.com/KIS-2013-03
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/81925
Scores
EPSS
0.0005
EPSS Percentile
15.7%
Details
Status
published
Products (12)
joomla/joomla\!
2.5.0
joomla/joomla\!
2.5.1
joomla/joomla\!
2.5.2
joomla/joomla\!
2.5.3
joomla/joomla\!
2.5.4
joomla/joomla\!
2.5.5
joomla/joomla\!
2.5.6
joomla/joomla\!
2.5.7
joomla/joomla\!
2.5.8
joomla/joomla\!
3.0.0
... and 2 more
Published
Feb 13, 2013
Tracked Since
Feb 18, 2026