WebCitz Blog


Joomla! Security News

Joomla! Security News
Grant
Grant
May 8, 2019
Posted in  Web Design

WebCitz would like to inform you that an update has been released in Joomla! 3.9.6. Please, upgrade your Joomla website as soon as possible to patch the security issues. This release fixes several security vulnerabilities. Always remember to take backups before running upgrades. If you need help upgrading your website, contact us today.

[20190502] – Core – By-passing protection of Phar Stream Wrapper Interceptor

Description

In Joomla! 3.9.3, the vulnerability of insecure de-serialization when executing Phar archives was addressed by removing the known attack vector in the Joomla! core. In order to intercept file invocations like “file_exists” or “stat” on compromised Phar archives the base name has to be determined and checked before allowing to be handled by PHP Phar stream handling. The used implementation however is vulnerable to path traversal leading to scenarios where the Phar archive to be assessed is not the actual (compromised) file.

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Versions: 3.9.3 through 3.9.5
  • Exploit Type: Object Injection
  • Reported Date: 2019-March-27
  • Fixed Date: 2019-May-07

Affected Installs

Joomla! CMS versions 3.9.3 through 3.9.5

Solution

Upgrade to version 3.9.6

Contact

The JSST at the Joomla! Security Centre.

Reported by: Daniel le Gail, Fix coordinated by Oliver Hader from TYPO3

[20190501] – Core – XSS in com users ACL debug views

Description

The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Versions: 1.7.0 through 3.9.5
  • Exploit Type: XSS
  • Reported Date: 2019-April-29
  • Fixed Date: 2019-May-07
  • CVE Number: CVE-2019-11809

Affected Installs

Joomla! CMS versions 1.7.0 through 3.9.5

Solution

Upgrade to version 3.9.6

Contact

The JSST at the Joomla! Security Centre.

Reported By: Jose Antonio Rodriguez Garcia and Phil Keeble (MWR InfoSecurity)


Related Topics: