This vulnerability was found in the JNews plugin and showed how we bypassed the file extension validation and how we discovered two diferent unrestricted file upload forms.
Code review
- Following the journey of targeting low-hanging fruits in Joomla plugins, this issue was discovered to pose Hikashop’s users to a low risk by allowing arbitrary JavaScript code being injected from the control panel.
- This post was the result of a code-review made to the Joomla Content Editor plugin. It was possible to bypass the file upload validation in order to submit a webshell.