There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / archive
- Impact: Moderate
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Path Traversal
- Reported Date: 2022-02-20
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23793
Description
Extracting an specifilcy crafted tar package could write files outside of the intended path.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / filesystem
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Path Disclosure
- Reported Date: 2021-02-17
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23794
Description
Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Incorrect Access Control
- Reported Date: 2020-09-23
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23795
Description
A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.