News
[20240805] - Core - XSS vectors in Outputfilter::strip* methods
- Details
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Moderate
- Probability: Low
- Versions: 3.0.0-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2
- Exploit type: XSS
- Reported Date: 2024-07-22
- Fixed Date: 2024-08-20
- CVE Number: CVE-2024-40743
Description
The stripImages and stripIframes methods didn't properly process inputs, leading to XSS vectors.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2
Solution
Upgrade to version 3.10.17-elts, 4.4.7 or 5.1.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Jesper den Boer
[20240804] - Core - Improper ACL for backend profile view
- Details
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Moderate
- Probability: Low
- Versions: 4.0.0-4.4.6, 5.0.0-5.1.2
- Exploit type: XSS
- Reported Date: 2024-07-22
- Fixed Date: 2024-08-20
- CVE Number: CVE-2024-27187
Description
Improper Access Controls allows backend users to overwrite their username when disallowed.
Affected Installs
Joomla! CMS versions 4.0.0-4.4.6, 5.0.0-5.1.2
Solution
Upgrade to version 4.4.7 or 5.1.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Elysee Franchuk
[20240803] - Core - XSS in HTML Mail Templates
- Details
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 4.0.0-4.4.6, 5.0.0-5.1.2
- Exploit type: XSS
- Reported Date: 2024-07-22
- Fixed Date: 2024-08-20
- CVE Number: CVE-2024-27186
Description
The mail template feature lacks an escaping mechanism, causing XSS vectors in multiple extensions.
Affected Installs
Joomla! CMS versions 4.0.0-4.4.6, 5.0.0-5.1.2
Solution
Upgrade to version 4.4.7 or 5.1.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Elysee Franchuk
[20240802] - Core - Cache Poisoning in Pagination
- Details
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 3.0.0-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2
- Exploit type: Cache Poisoning
- Reported Date: 2024-05-23
- Fixed Date: 2024-08-20
- CVE Number: CVE-2024-27185
Description
The pagination class includes arbitrary parameters in links, leading to cache poisoning attack vectors.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2
Solution
Upgrade to version 3.10.17-elts, 4.4.7 or 5.1.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Shane Edwards
[20240801] - Core - Inadequate validation of internal URLs
- Details
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 3.4.6-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2
- Exploit type: Open redirect
- Reported Date: 2024-03-20
- Fixed Date: 2024-08-20
- CVE Number: CVE-2024-27184
Description
Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.
Affected Installs
Joomla! CMS versions 3.4.6-3.10.16-elts,4.0.0-4.4.6, 5.0.0-5.1.2
Solution
Upgrade to version 3.10.17-elts, 4.4.7 or 5.1.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Gareth Heyes (PortSwigger Research) & Teodor Ivanov