Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_112485
HistoryJun 26, 2020 - 12:00 a.m.

Joomla! 2.5.x < 3.9.19 Multiple Vulnerabilities

2020-06-2600:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
61

According to its self-reported version, the instance of Joomla! running on the remote web server is 2.5.x prior to 3.9.19. It is, therefore, affected by multiple vulnerabilities :

  • Lack of input validation in the heading tag option of the "Articles – Newsflash" and "Articles - Categories" modules allow Cross-Site Scripting (XSS) attacks. (CVE-2020-13761)

  • The default settings of the global textfilter configuration doesn’t block HTML inputs for Guest users. (CVE-2020-13763)

  • Incorrect input validation of the module tag option in com_modules allow Cross-Site Scripting (XSS) attacks. (CVE-2020-13762)

  • Two Cross-Site Scripting (XSS) vulnerabilities in jQuery. (CVE-2020-11022 / CVE-2020-11023)

  • Missing token checks in com_postinstall cause CSRF vulnerabilities. (CVE-2020-13760)

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data
VendorProductVersionCPE
joomlajoomla\!*cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

References