There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Versions: 3.2.0 - 3.9.24
- Exploit type: Insecure Randomness
- Reported Date: 2021-01-13
- Fixed Date: 2021-03-02
- CVE Number: CVE-2021-23128
Description
The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to "random_bytes()" and its backport that is shipped within random_compat.
This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.
Affected Installs
Joomla! CMS versions 3.2.0 - 3.9.24
Solution
Upgrade to version 3.9.25
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Versions: 2.5.0 - 3.9.24
- Exploit type: XSS
- Reported Date: 2020-05-07
- Fixed Date: 2021-03-02
- CVE Number: CVE-2021-23129
Description
Missing filtering of messages showed to users that could lead to xss issues.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.9.24
Solution
Upgrade to version 3.9.25
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Versions: 3.0.0 - 3.9.24
- Exploit type: Path Traversal
- Reported Date: 2020-09-08
- Fixed Date: 2021-03-02
- CVE Number: CVE-2021-26028
Description
Extracting an specifilcy crafted zip package could write files outside of the intended path.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.9.24
Solution
Upgrade to version 3.9.25
Contact
The JSST at the Joomla! Security Centre.