• 1PO Box Collins Street West, Australia
  • +61 3 8376 6284
  • info@example.com

    News Feed Category

    Joomla! Security News

      • Project: Joomla!
      • SubProject: CMS
      • Impact:Moderate
      • Severity: Low
      • Versions: 2.5.0 through 3.8.12
      • Exploit type: CSRF
      • Reported Date: 2018-September-26
      • Fixed Date: 2018-October-02
      • CVE Number: CVE-2018-17858

      Description

      Added additional CSRF hardening in com_installer actions in the backend.

      Affected Installs

      Joomla! CMS versions 2.5.0 through 3.8.12

      Solution

      Upgrade to version 3.8.13

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Raviraj A. Powar
      • Project: Joomla!
      • SubProject: CMS
      • Impact:Moderate
      • Severity: Low
      • Versions: 1.5.0 through 3.8.12
      • Exploit type: ACL Violation
      • Reported Date: 2017-December-27
      • Fixed Date: 2018-October-02
      • CVE Number: CVE-2018-17855

      Description

      In case that an attacker gets access to the mail account of an user who can approve admin verifications in the registration process he can activate himself.

      Affected Installs

      Joomla! CMS versions 1.5.0 through 3.8.12

      Solution

      Upgrade to version 3.8.13

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Paul Freeman
      • Project: Joomla!
      • SubProject: CMS
      • Impact:Moderate
      • Severity: Low
      • Versions: 3.1.0 through 3.8.12
      • Exploit type: ACL Violation
      • Reported Date: 2018-June-20
      • Fixed Date: 2018-October-02
      • CVE Number: CVE-2018-17857

      Description

      Inadequate checks on the tags search fields can lead to an access level violation.

      Affected Installs

      Joomla! CMS versions 3.1.0 through 3.8.12

      Solution

      Upgrade to version 3.8.13

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Андрей Капитанов
      • Project: Joomla!
      • SubProject: CMS
      • Impact:High
      • Severity: Low
      • Versions: 2.5.4 through 3.8.12
      • Exploit type: Object Injection
      • Reported Date: 2018-June-21
      • Fixed Date: 2018-October-02
      • CVE Number: CVE-2018-17856

      Description

      Joomla’s com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled access of Administrator-level users to access com_joomlaupdate and trigger a code execution.

      Affected Installs

      Joomla! CMS versions 2.5.4 through 3.8.12

      Solution

      Upgrade to version 3.8.13

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By:Codesafescan
      • Project: Joomla!
      • SubProject: CMS
      • Impact:Moderate
      • Severity: Low
      • Versions: 2.5.0 through 3.8.12
      • Exploit type: Incorrect Access Control
      • Reported Date: 2018-September-17
      • Fixed Date: 2018-October-02
      • CVE Number: CVE-2018-17859

      Description

      Inadequate checks in com_contact could allowed mail submission in disabled forms.

      Affected Installs

      Joomla! CMS versions 2.5.0 through 3.8.12

      Solution

      Upgrade to version 3.8.13

      Contact

      The JSST at the Joomla! Security Centre.

      Reported By: David Jardin (JSST)

    footer logo

    Praesent vel rutrum purus. Nam vel dui eu risus duis dignissim dignissim area Suspen derocongueconsequat.Fusce sit amet urna iat.Praesent vel rutrum purus. Nam vel dui eu risus.

    © 2017 Builder All Rights Reserved. Designed by yourcompany.com

    Search