Joomla! < 1.0.11 administrator/index.php Input Weakness

medium Nessus Plugin ID 22297

Synopsis

The remote web server contains a PHP application that is affected by an input sanitization vulnerability.

Description

The version of Joomla! installed on the remote host is affected by an input weakness flaw in the administrator/index.php script due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this to impact confidentiality, integrity, or availability. No other details are available.

Note that Joomla! is reportedly affected by additional vulnerabilities; however, Nessus has not tested for these.

Solution

Upgrade to Joomla! version 1.0.11 or later.

See Also

http://www.nessus.org/u?9c6f8af3

Plugin Details

Severity: Medium

ID: 22297

File Name: joomla_1011.nasl

Version: 1.25

Type: remote

Family: CGI abuses

Published: 9/1/2006

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: installed_sw/Joomla!, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/28/2006

Vulnerability Publication Date: 8/28/2006

Reference Information

CVE: CVE-2006-4468

BID: 19749

CWE: 264, 94