Joomla! < 3.6.1 Multiple Vulnerabilities

medium Nessus Plugin ID 92871

Synopsis

The remote web server contains a PHP application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the Joomla! installation running on the remote web server is prior to 3.6.1. It is, therefore, affected by multiple vulnerabilities :

- A cross-site scripting (XSS) vulnerability exists in the mail component due to improper sanitization of input before returning it to users. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.

- An information disclosure vulnerability exists in the com_content component due to insufficient access control list (ACL) checks. A remote attacker can exploit this to disclose sensitive information.

- A cross-site request forgery (XSRF) vulnerability exists in the com_joomlaupdate component due to a failure to require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions.
A remote attacker can exploit this, by convincing a user to follow a specially crafted link, to cause the user to perform unspecified actions. Note that this issue only affects version 3.6.0.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Joomla! version 3.6.1 or later.

See Also

http://www.nessus.org/u?e91ac130

http://www.nessus.org/u?7370ce7d

http://www.nessus.org/u?21440bbe

http://www.nessus.org/u?239b57c1

Plugin Details

Severity: Medium

ID: 92871

File Name: joomla_361.nasl

Version: 1.13

Type: remote

Family: CGI abuses

Published: 8/11/2016

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/Joomla!

Excluded KB Items: Settings/disable_cgi_scanning

Patch Publication Date: 8/3/2016

Vulnerability Publication Date: 8/3/2016

Reference Information

BID: 92340, 92342