Security Announcements

Security Announcements

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Critical
    • Severity: High
    • Probability: High
    • Versions:4.0.0-4.2.7
    • Exploit type: Incorrect Access Control
    • Reported Date: 2023-02-13
    • Fixed Date: 2023-02-16
    • CVE Number: CVE-2023-23752

    Description

    An improper access check allows unauthorized access to webservice endpoints.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.7

    Solution

    Upgrade to version 4.2.8

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Zewei Zhang from NSFOCUS TIANJI Lab
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.2.4
    • Exploit type: Reflexted XSS
    • Reported Date: 2022-10-28
    • Fixed Date: 2022-11-08
    • CVE Number: CVE-2022-27914

    Description

    Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in com_media..

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.4

    Solution

    Upgrade to version 4.2.5

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:https://github.com/Denitz
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.2.6
    • Exploit type: CSRF
    • Reported Date: 2022-12-24
    • Fixed Date: 2023-01-31
    • CVE Number: CVE-2023-23750

    Description

    A missing token check causes a CSRF vulnerability in the handling of post-installation messages.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.6

    Solution

    Upgrade to version 4.2.7

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Faizan Wani
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.2.6
    • Exploit type: Incorrect Access Control
    • Reported Date: 2023-01-01
    • Fixed Date: 2023-01-31
    • CVE Number: CVE-2023-23751

    Description

    A missing ACL check allows non super-admin users to access com_actionlogs.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.6

    Solution

    Upgrade to version 4.2.7

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Faizan Wani
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.2.3
    • Exploit type: Reflexted XSS
    • Reported Date: 2022-10-07
    • Fixed Date: 2022-10-25
    • CVE Number: CVE-2022-27913

    Description

    Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.3

    Solution

    Upgrade to version 4.2.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Ajith Menon
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Critical
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.2.3
    • Exploit type: Information Disclosure
    • Reported Date: 2022-10-13
    • Fixed Date: 2022-10-25
    • CVE Number: CVE-2022-27912

    Description

    Joomla 4 sites with publicly enabled debug mode exposed data of previous requests.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.2.3

    Solution

    Upgrade to version 4.2.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Peter Martin
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:4.2.0
    • Exploit type: Path Disclosure
    • Reported Date: 2022-08-27
    • Fixed Date: 2022-08-30
    • CVE Number: CVE-2022-27911

    Description

    Multiple Full Path Disclosures because of missing '_JEXEC or die check' caused by the PSR12 changes done in 4.2.0. According to PROD2020/023 and in coordination with the JSST this has been patched in the public tracker vis #38615

    Affected Installs

    Joomla! CMS versions 4.2.0

    Solution

    Upgrade to version 4.2.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:SharkyKZ
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / archive
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Path Traversal
    • Reported Date: 2022-02-20
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23793

    Description

    Extracting an specifilcy crafted tar package could write files outside of the intended path.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Egidio Romano
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / filesystem
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Path Disclosure
    • Reported Date: 2021-02-17
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23794

    Description

    Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:DangKhai from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Probability: Low
    • Versions:2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Incorrect Access Control
    • Reported Date: 2020-09-23
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23795

    Description

    A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Phil Taylor