Synopsis
The remote web server contains a PHP application that is affected by multiple vulnerabilities.
Description
According to its self-reported version number, the Joomla! installation running on the remote web server is 3.x prior to 3.2.3.
It is, therefore, affected by multiple vulnerabilities :
- A SQL injection vulnerability exists within weblinks-categories due to improper sanitization of user-supplied input to the category 'ID' parameter before using it in SQL queries. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data.
(CVE-2014-7981)
- An unspecified cross-site scripting (XSS) vulnerability exists due to improper validation of input before returning it to users. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2014-7982)
- A cross-site scripting (XSS) vulnerability exists within the index.php/single-contact script due to improper validation of input to the 'jform[contact_email]' POST parameter before returning it to users. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2014-7983)
- A security bypass vulnerability exists that allows a remote attacker to bypass intended restrictions and log into the system using GMail credentials. (CVE-2014-7984)
- A SQL injection vulnerability exists in the ModTagssimilarHelper::getList() function within file modules/mod_tags_similar/helper.php due to improper sanitization of user-supplied input before using it in SQL queries. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Joomla! version 3.2.3 or later.
Plugin Details
File Name: joomla_323.nasl
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X
Vulnerability Information
CPE: cpe:/a:joomla:joomla%5c%21
Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/Joomla!
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Patch Publication Date: 3/6/2014
Vulnerability Publication Date: 2/6/2014
Reference Information
CVE: CVE-2014-7981, CVE-2014-7982, CVE-2014-7983, CVE-2014-7984
BID: 77808, 80037, 80051, 80065
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990