- Project: Joomla!
- SubProject: CMS
- Impact: Critical
- Severity: Moderate
- Probability: Low
- Versions: 4.2.0-4.3.1
- Exploit type: Lack of rate limiting
- Reported Date: 2023-04-29
- Fixed Date: 2023-05-30
- CVE Number: CVE-2023-23755
Description
The lack of rate limiting allows brute force attacks against MFA methods.
Affected Installs
Joomla! CMS versions 4.2.0-4.3.1
Solution
Upgrade to version 4.3.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Phil Taylor
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.2.0-4.3.1
- Exploit type: Open Redirect / XSS
- Reported Date: 2023-02-28
- Fixed Date: 2023-05-28
- CVE Number: CVE-2023-23754
Description
Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.
Affected Installs
Joomla! CMS versions 4.2.0-4.3.1
Solution
Upgrade to version 4.3.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Srpopty from huntr.dev
- Project: Joomla!
- SubProject: CMS
- Impact: Critical
- Severity: High
- Probability: High
- Versions: 4.0.0-4.2.7
- Exploit type: Incorrect Access Control
- Reported Date: 2023-02-13
- Fixed Date: 2023-02-16
- CVE Number: CVE-2023-23752
Description
An improper access check allows unauthorized access to webservice endpoints.
Affected Installs
Joomla! CMS versions 4.0.0-4.2.7
Solution
Upgrade to version 4.2.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Zewei Zhang from NSFOCUS TIANJI Lab