Joomla Security News

Список известных уязвимостей Joomla, которые можно устранить.
Машинный перевод этой страницы на русский язык

[20200103] - Core - XSS in com_actionlogs

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 3.9.0-3.9.14
  • Exploit type: XSS
  • Reported Date: 2019-December-25
  • Fixed Date: 2020-January-28
  • CVE Number: CVE-2020-8421

Description

Inadequate escaping of usernames allow XSS attacks in com_actionlogs.

Affected Installs

Joomla! CMS versions 3.9.0 - 3.9.14

Solution

Upgrade to version 3.9.15


[20200102] - Core - CSRF com_templates LESS compiler

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 3.0.0-3.9.14
  • Exploit type: CSRF
  • Reported Date: 2019-December-18
  • Fixed Date: 2020-January-28
  • CVE Number: CVE-2020-8420

Description

A missing CSRF token check in the LESS compiler of com_templates causes a CSRF vulnerability.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.14

Solution

Upgrade to version 3.9.15


[20200101] - Core - CSRF in batch actions

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.0.0-3.9.14
  • Exploit type: CSRF
  • Reported Date: 2019-December-23
  • Fixed Date: 2020-January-28
  • CVE Number: CVE-2020-8419

Description

Missing token checks in the batch actions of various components causes CSRF vulnerabilities.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.14

Solution

Upgrade to version 3.9.15


[20191202] - Core - Various SQL injections through configuration parameters

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 2.5.0 - 3.9.13
  • Exploit type: SQL injection
  • Reported Date: 2019-December-01
  • Fixed Date: 2019-December-17
  • CVE Number: CVE-2019-19846

Description

The lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.

Affected Installs

Joomla! CMS versions 2.5.0 - 3.9.13

Solution

Upgrade to version 3.9.14


[20191201] - Core - Path Disclosure in framework files

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.8.0 - 3.9.13
  • Exploit type: Path Disclosure
  • Reported Date: 2019-November-22
  • Fixed Date: 2019-December-17
  • CVE Number: CVE-2019-19845

Description

Missing access check in framework files could lead to a path disclosure.

Affected Installs

Joomla! CMS versions 3.8.0 - 3.9.13

Solution

Upgrade to version 3.9.14


[20191002] - Core - Path Disclosure in phpuft8 mapping files

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.6.0 - 3.9.12
  • Exploit type: Path Disclosure
  • Reported Date: 2019-November-01
  • Fixed Date: 2019-November-05
  • CVE Number: CVE-2019-18674

Description

Missing access check in the phputf8 mapping files could lead to an path disclosure.

Affected Installs

Joomla! CMS versions 3.6.0 - 3.9.12

Solution

Upgrade to version 3.9.13


[20191001] - Core - CSRF in com_template overrides view

  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Versions: 3.2.0-3.9.12
  • Exploit type: CSRF
  • Reported Date: 2019-October-10
  • Fixed Date: 2019-November-05
  • CVE Number: CVE-2019-18650

Description

A missing token check in com_template causes a CSRF vulnerability.

Affected Installs

Joomla! CMS versions 3.2.0 - 3.9.12

Solution

Upgrade to version 3.9.13


[20190901] - Core - XSS in logo parameter of default templates

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.0.0-3.9.11
  • Exploit type: XSS
  • Reported Date: 2019-August-28
  • Fixed Date: 2019-September-24
  • CVE Number: CVE-2019-16725

Description

Inadequate escaping allowed XSS attacks using the logo parameter of the default templates.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.11

Solution

Upgrade to version 3.9.12


[20190801] - Core - Hardening com_contact contact form

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 1.6.2 - 3.9.10
  • Exploit type: Incorrect Access Control
  • Reported Date: 2019-April-09
  • Fixed Date: 2019-August-13
  • CVE Number: CVE-2019-15028

Description

Inadequate checks in com_contact could allowed mail submission in disabled forms.

Affected Installs

Joomla! CMS versions 1.6.2 - 3.9.10

Solution

Upgrade to version 3.9.11


[20190701] - Core - Filter attribute in subform fields allows remote code execution

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 3.9.7 - 3.9.8
  • Exploit type: Remote Code Execution
  • Reported Date: 2019-June-20
  • Fixed Date: 2019-July-09
  • CVE Number: CVE-2019-14654

Description

Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.

Affected Installs

Joomla! CMS versions 3.9.7 - 3.9.8

Solution

Upgrade to version 3.9.9