FreeBSD : Joomla! -- multiple vulnerabilities (c0ef061a-c7f0-11e6-ae1b-002590263bf5)

high Nessus Plugin ID 96061

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The JSST and the Joomla! Security Center report : [20151206] - Core - Session Hardening The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions.
[20151207] - Core - SQL Injection Inadequate filtering of request data leads to a SQL Injection vulnerability.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?96252f3a

http://www.nessus.org/u?3b562b7b

http://www.nessus.org/u?3b5dd1d2

http://www.nessus.org/u?946aa0dc

Plugin Details

Severity: High

ID: 96061

File Name: freebsd_pkg_c0ef061ac7f011e6ae1b002590263bf5.nasl

Version: 3.3

Type: local

Published: 12/22/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:joomla3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/22/2016

Vulnerability Publication Date: 12/21/2015