News Feed Category

Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Impact:Moderate
    • Severity: High
    • Versions: 3.8.0 through 3.9.3
    • Exploit type: XSS
    • Reported Date: 2019-February-28
    • Fixed Date: 2019-March-12
    • CVE Number: CVE-2019-9713

    Description

    The sample data plugins lack ACL checks, allowing unauthorized access.

    Affected Installs

    Joomla! CMS versions 3.8.0 through 3.9.3

    Solution

    Upgrade to version 3.9.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Sven Hurt, Benjamin Trenkle
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Low
    • Severity: Low
    • Versions: 3.0.0 through 3.9.3
    • Exploit type: XSS
    • Reported Date: 2019-February-25
    • Fixed Date: 2019-March-12
    • CVE Number: CVE-2019-9714

    Description

    The media form field lacks escaping, leading to a XSS vulnerability.

    Affected Installs

    Joomla! CMS versions 3.2.0 through 3.9.3

    Solution

    Upgrade to version 3.9.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Fouad Maakor
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Low
    • Severity: Low
    • Versions: 3.0.0 through 3.9.3
    • Exploit type: XSS
    • Reported Date: 2019-February-25
    • Fixed Date: 2019-March-12
    • CVE Number: CVE-2019-9711

    Description

    The item_title layout in edit views lacks escaping, leading to a XSS vulnerability.

    Affected Installs

    Joomla! CMS versions 3.2.0 through 3.9.3

    Solution

    Upgrade to version 3.9.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Fouad Maakor
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Low
    • Severity: Low
    • Versions: 3.2.0 through 3.9.3
    • Exploit type: XSS
    • Reported Date: 2019-March-04
    • Fixed Date: 2019-March-12
    • CVE Number: CVE-2019-9712

    Description

    The JSON handler in com_config lacks input validation, leading to XSS vulnerability.

    Affected Installs

    Joomla! CMS versions 3.2.0 through 3.9.3

    Solution

    Upgrade to version 3.9.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Mario Korth, Hackmanit
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Low
    • Severity: Low
    • Versions: 2.5.0 through 3.9.2
    • Exploit type: Object Injection
    • Reported Date: 2019-January-18
    • Fixed Date: 2019-February-12
    • CVE Number: CVE-2019-7743

    Description

    The phar:// stream wrapper can be used for objection injection attacks. We now disallow usage of the phar:// handler for non .phar-files within the CMS globally by implementing the TYPO3 PHAR stream wrapper.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.9.2

    Solution

    Upgrade to version 3.9.3

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:David Jardin (JSST)

About ET Shoes

Ball tip biltong pork belly frankfurter shankle jerky leberkas pig kielbasa kay boudin alcatra short loin.

Jowl salami leberkas turkey pork brisket meatball turducken flank bilto porke belly ball tip. pork belly frankf urtane bilto

Get In Touch

Address: 262 Milacina Mrest Street.

Phone: +84 3333 6789.

Tax: +04 3333 6789.

Email: support@yoursiteurl.com

Website: www.yoursiteurl.com

Join Our Community

Sign up to receive email for the latest information.

Search