Joomla! Extension 'JCK Suite' - 'jckeditor' =< 6.4.4 Privilege Escalation

high Nessus Plugin ID 121255

Synopsis

The remote Joomla! application has a plugin installed that is vulnerable to a sql injection attack.

Description

The Joomla! application running on the remote host has a version of 'JCK Suite' - 'jckeditor' extension that is prior or equal to 6.4.4.
As such, the host is affected by a SQL injection (SQLi) vulnerability exists due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries in the back-end database, resulting in the disclosure or manipulation of arbitrary data.

Solution

Update the 'JCK Suite' - 'jckeditor' extension through the administrative dashboard.

See Also

https://extensions.joomla.org/extension/jck-editor/

https://www.exploit-db.com/exploits/45423

Plugin Details

Severity: High

ID: 121255

File Name: joomla_extension_jcksuite_6_4_4.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 1/21/2019

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

CVSS Score Rationale: Standard sql injection

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: www/PHP, installed_sw/Joomla!

Excluded KB Items: Settings/disable_cgi_scanning

Vulnerability Publication Date: 9/14/2018