Lucene search

K
nessusThis script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_112713
HistoryMar 05, 2021 - 12:00 a.m.

Joomla! 3.x < 3.9.25 Multiple Vulnerabilities

2021-03-0500:00:00
This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
61

According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 3.9.25. It is, therefore, affected by multiple vulnerabilities.

  • Usage of the insecure rand() function within the process of generating the 2FA secret. (CVE-2021-23126)

  • Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes. (CVE-2021-23127)

  • The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. (CVE-2021-23128)

  • Missing filtering of messages showed to users that could lead to XSS issues. (CVE-2021-23129)

  • Missing filtering of feed fields could lead to XSS issues. (CVE-2021-23130)

  • Missing input validation within the template manager. (CVE-2021-23131)

  • com_media allowed paths that are not intended for image uploads. (CVE-2021-23132)

  • Incorrect ACL checks could allow unauthorized change of the category for an article. (CVE-2021-26027)

  • Extracting an specifilcy crafted zip package could write files outside of the intended path. (CVE-2021-26028)

  • Inadequate filtering of form contents could allow to overwrite the author field. (CVE-2021-26029)

Note that the scanner has not tested for these issues but has instead relied only on the applicationโ€™s self-reported version number.

No source data
VendorProductVersionCPE
joomlajoomla\!*cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

References