Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_114218
HistoryFeb 21, 2024 - 12:00 a.m.

Joomla! 1.5.x < 4.4.3 Multiple Vulnerabilities

2024-02-2100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
31
joomla
vulnerabilities
session expiration
open redirect
xss
content filtering
cve-2024-21722
cve-2024-21723
cve-2024-21724
cve-2024-21725
cve-2024-21726
scanner

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

According to its self-reported version, the instance of Joomla! running on the remote web server is 1.5.x prior to 4.4.3 or 5.x prior to 5.0.3. It is, therefore, affected by multiple vulnerabilities.

  • An insufficient session expiration in MFA management views. (CVE-2024-21722)

  • An open redirect in installation application. (CVE-2024-21723)

  • A Cross-Site Scripting (XSS) in media selection fields. (CVE-2024-21724)

  • A Cross-Site Scripting (XSS) in mail address outputs. (CVE-2024-21725)

  • An inadequate content filtering within the filter code. (CVE-2024-21726)

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data
VendorProductVersionCPE
joomlajoomla\!*cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

References

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%