Security Announcements

Security Announcements

    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / archive
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Path Traversal
    • Reported Date: 2022-02-20
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23793

    Description

    Extracting an specifilcy crafted tar package could write files outside of the intended path.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Egidio Romano
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / filesystem
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Path Disclosure
    • Reported Date: 2021-02-17
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23794

    Description

    Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:DangKhai from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Probability: Low
    • Versions:2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Incorrect Access Control
    • Reported Date: 2020-09-23
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23795

    Description

    A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 or 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Phil Taylor
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:3.7.0 - 3.10.6
    • Exploit type: XSS
    • Reported Date: 2021-05-06
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23796

    Description

    Lack of input validation could allow an XSS attack using com_fields

    Affected Installs

    Joomla! CMS versions 3.7.0 - 3.10.6

    Solution

    Upgrade to version 3.10.7

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hoàng Nguyễn
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Probability: Low
    • Versions:3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: SQL Injection
    • Reported Date: 2021-03-04
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23797

    Description

    Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 & 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hoàng Nguyễn
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Probability: Low
    • Versions:2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
    • Exploit type: Open redirect
    • Reported Date: 2021-03-23
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23798

    Description

    Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0

    Solution

    Upgrade to version 3.10.7 & 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Loïc LE MÉTAYER
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / input
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0 - 4.1.0
    • Exploit type: Variable Tampering
    • Reported Date: 2021-11-05
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23799

    Description

    Under specific circumstances, JInput pollutes method-specific input bags with $_REQUEST data.

    Affected Installs

    Joomla! CMS versions 4.0.0 - 4.1.0

    Solution

    Upgrade to version 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Nicholas K. Dionysopoulos, Phil Taylor
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / filter
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0 - 4.1.0
    • Exploit type: XSS
    • Reported Date: 2022-01-19
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23800

    Description

    Inadequate content filtering leads to XSS vulnerabilities in various components.

    Affected Installs

    Joomla! CMS versions 4.0.0 - 4.1.0

    Solution

    Upgrade to version 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Sebastian Morris, pwnCTRL
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0 - 4.1.0
    • Exploit type: XSS
    • Reported Date: 2021-08-25
    • Fixed Date: 2022-03-29
    • CVE Number: CVE-2022-23801

    Description

    Possible XSS attack vector through SVG embedding in com_media.

    Affected Installs

    Joomla! CMS versions 4.0.0 - 4.1.0

    Solution

    Upgrade to version 4.1.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Julia Polner, Simon Stockhause
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: High
    • Versions:4.0.0
    • Exploit type: Incorrect Access Control
    • Reported Date: 2021-08-20
    • Fixed Date: 2021-08-24
    • CVE Number: CVE-2021-26040

    Description

    The media manager does not correctly check the user's permissions before executing a file deletion command.

    Affected Installs

    Joomla! CMS versions 4.0.0

    Solution

    Upgrade to version 4.0.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Maverick