Joomla

[20210402] - Core - Inadequate filters on module layout settings

1 month 4 weeks ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.0.0 - 3.9.25
  • Exploit type: LFI
  • Reported Date: 2021-01-03
  • Fixed Date: 2021-04-13
  • CVE Number: CVE-2021-26031
Description

Inadequate filters on module layout settings could lead to an LFI.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.25

Solution

Upgrade to version 3.9.26

Contact

The JSST at the Joomla! Security Centre.

Reported By: Lee Thao from Viettel Cyber Security
Joomla! Security Strike Team

[20210401] - Core - Escape xss in logo parameter error pages

1 month 4 weeks ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.0.0 - 3.9.25
  • Exploit type: XSS
  • Reported Date: 2021-03-09
  • Fixed Date: 2021-04-13
  • CVE Number: CVE-2021-26030
Description

Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error pages.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.25

Solution

Upgrade to version 3.9.26

Contact

The JSST at the Joomla! Security Centre.

Reported By: HOANG NGUYEN
Joomla! Security Strike Team

[20210309] - Core - Inadequate filtering of form contents could allow to overwrite the author field

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 1.6.0 - 3.9.24
  • Exploit type: ACL Violation
  • Reported Date: 2021-01-31
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-26029
Description

Inadequate filtering of form contents could allow to overwrite the author field. The affected core components are com_fields, com_categories, com_banners, com_contact, com_newsfeeds and com_tags. 

Affected Installs

Joomla! CMS versions 1.6.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: DangKhai from Viettel Cyber Security
Joomla! Security Strike Team

[20210307] - Core - ACL violation within com_content frontend editing

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.0.0 - 3.9.24
  • Exploit type: ACL violation
  • Reported Date: 2020-10-25
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-26027
Description

Incorrect ACL checks could allow unauthorized change of the category for an article.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Brian Teeman, George Wilson (JSST), David Jardin (JSST)
Joomla! Security Strike Team

[20210306] - Core - com_media allowed paths that are not intended for image uploads

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.0.0 - 3.9.24
  • Exploit type: Improper Input Validation
  • Reported Date: 2020-02-17
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23132
Description

com_media allowed paths that are not intended for image uploads.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Hoang Kien from VSEC
Joomla! Security Strike Team

[20210305] - Core - Input validation within the template manager

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.2.0 - 3.9.24
  • Exploit type: Improper Input Validation
  • Reported Date: 2020-05-07
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23131
Description

Missing input validation within the template manager.

Affected Installs

Joomla! CMS versions 3.2.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Bui Duc Anh Khoa from Viettel Cyber Security
Joomla! Security Strike Team

[20210304] - Core - XSS within the feed parser library

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 2.5.0 - 3.9.24
  • Exploit type: XSS
  • Reported Date: 2020-05-05
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23130
Description

Missing filtering of feed fields could lead to xss issues.

Affected Installs

Joomla! CMS versions 2.5.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Bui Duc Anh Khoa from Viettel Cyber Security
Joomla! Security Strike Team

[20210308] - Core - Path Traversal within joomla/archive zip class

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.0.0 - 3.9.24
  • Exploit type: Path Traversal
  • Reported Date: 2020-09-08
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-26028
Description

Extracting an specifilcy crafted zip package could write files outside of the intended path.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Šarūnas Paulauskas
Joomla! Security Strike Team

[20210303] - Core - XSS within alert messages showed to users

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 2.5.0 - 3.9.24
  • Exploit type: XSS
  • Reported Date: 2020-05-07
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23129
Description

Missing filtering of messages showed to users that could lead to xss issues.

Affected Installs

Joomla! CMS versions 2.5.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Bui Duc Anh Khoa from Viettel Cyber Security
Joomla! Security Strike Team

[20210302] - Core - Potential Insecure FOFEncryptRandval

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.2.0 - 3.9.24
  • Exploit type: Insecure Randomness
  • Reported Date: 2021-01-13
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23128
Description

The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to "random_bytes()" and its backport that is shipped within random_compat.

This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

Affected Installs

Joomla! CMS versions 3.2.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Hanno Böck
Joomla! Security Strike Team

[20210301] - Core - Insecure randomness within 2FA secret generation

3 months 1 week ago
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.2.0 - 3.9.24
  • Exploit type: Insecure Randomness
  • Reported Date: 2021-01-12
  • Fixed Date: 2021-03-02
  • CVE Number: CVE-2021-23126CVE-2021-23127
Description

Usage of the insecure rand() function within the process of generating the 2FA secret.
Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes.

Additional details as well as a more contexts for exising sites can be found in the docs: https://docs.joomla.org/J3.x:Changes_to_the_2FA_token_generation_recommendations_for_existing_sites

This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

Affected Installs

Joomla! CMS versions 3.2.0 - 3.9.24

Solution

Upgrade to version 3.9.25

Contact

The JSST at the Joomla! Security Centre.

Reported By: Hanno Böck
Joomla! Security Strike Team
Checked
1 hour 52 minutes ago
Subscribe to Joomla feed
Categrory