Charlottezweb

Joomla Security Notice :: May 23, 2018

Discussion started on Script Chat

Joomla has emailed a security announcement.  If you use Joomla for your site, please check your version and upgrade accordingly.

The announcement is available on their site here:

https://developer.joomla.org/security-centre.html

Quote
Joomla! Security News

________________________________________
    [20180509] - Core - XSS vulnerability in the media manager
    [20180508] - Core - Possible XSS attack in the redirect method
    [20180507] - Core - Session deletion race condition
    [20180506] - Core - Filter field in com_fields allows remote code execution
    [20180505] - Core - XSS Vulnerabilities & additional hardening
    [20180504] - Core - Installer leaks plain text password to local user
    [20180503] - Core - Information Disclosure about unpublished tags
    [20180502] - Core - Add PHAR files to the upload blacklist
    [20180501] - Core - ACL violation in access levels
[20180509] - Core - XSS vulnerability in the media manager
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Low
  -  Severity: Low
  -  Versions: 1.5.0 through 3.8.7
  -  Exploit type: XSS
  -  Reported Date: 2017-October-28
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-6378
Description
Inadequate filtering of file and folder names lead to various XSS attack vectors in the media manager.
Affected Installs
Joomla! CMS versions 1.5.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: David Jardin, JSST
 
 

[20180508] - Core - Possible XSS attack in the redirect method
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Low
  -  Severity: Low
  -  Versions: 3.1.2 through 3.8.7
  -  Exploit type: XSS
  -  Reported Date: 2018-March-30
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11328
Description
Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in a XSS vulnerability.
Affected Installs
Joomla! CMS versions 3.1.2 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: David Jardin, JSST
 
 

[20180507] - Core - Session deletion race condition
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Medium
  -  Severity: Low
  -  Versions: 3.0.0 through 3.8.7
  -  Exploit type: Session race condition
  -  Reported Date: 2017-July-08
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11324
Description
A long running background process, such as remote checks for core or extension updates, could create a race condition where a session which was expected to be destroyed would be recreated.
Affected Installs
Joomla! CMS versions 3.0.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Additional Resources
  -  Links Go Here
Contact
The JSST at the Joomla! Security Centre.
Reported By: David Jardin, JSST
 
 

[20180506] - Core - Filter field in com_fields allows remote code execution
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Moderate
  -  Severity: Low
  -  Versions: 3.7.0 through 3.8.7
  -  Exploit type: Remote Code Execution
  -  Reported Date: 2018-May-14
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11321
Description
Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.
Affected Installs
Joomla! CMS versions 3.7.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Benjamin Trenkle, JSST
 
 

[20180505] - Core - XSS Vulnerabilities & additional hardening
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Moderate
  -  Severity: Moderate
  -  Versions: 3.0.0 through 3.8.7
  -  Exploit type:XSS
  -  Reported Date:2018-February-02 & 2018-March-27
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11326
Description
Inadequate input filtering leads to multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.
Affected Installs
Joomla! CMS versions 3.0.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Additional Resources
  -  You can find more details and other default changes in 3.8.8 at the Documentation.
Contact
The JSST at the Joomla! Security Centre.
Reported By: Kai Zhao of 3H Security Team & Zhouyuan Yang (FortiGuard Labs)
 
 

[20180504] - Core - Installer leaks plain text password to local user
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Low
  -  Severity: Low
  -  Versions: 3.0.0 through 3.8.7
  -  Exploit type: Information Disclosure
  -  Reported Date: 2018-February-09
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11325
Description
The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and displays the plain text password for the administrator account at the confirmation screen.
Affected Installs
Joomla! CMS versions 3.0.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Sascha Egerer
 
 

[20180503] - Core - Information Disclosure about unpublished tags
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: Low
  -  Severity: Moderate
  -  Versions: 3.1.0 through 3.8.7
  -  Exploit type: Information Disclosure
  -  Reported Date: 2018-April-27
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11327
Description
Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission .
Affected Installs
Joomla! CMS versions 3.1.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Phil Taylor, JSST
 
 

[20180502] - Core - Add PHAR files to the upload blacklist
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: High
  -  Severity: Low
  -  Versions: 2.5.0 through 3.8.7
  -  Exploit type: Malicious file upload
  -  Reported Date: 2018-March-14
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11322
Description
Depending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.
Affected Installs
Joomla! CMS versions 2.5.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Demis Palma, JSST
 
 

[20180501] - Core - ACL violation in access levels
Posted: 22 May 2018 06:30 AM PDT
  -  Project: Joomla!
  -  SubProject: CMS
  -  Impact: High
  -  Severity: Low
  -  Versions: 2.5.0 through 3.8.7
  -  Exploit type: ACL violation
  -  Reported Date: 2018-March-08
  -  Fixed Date: 2018-May-22
  -  CVE Number: CVE-2018-11323
Description
Inadequate checks allowed users to modify the access levels of user groups with higher permissions.
Affected Installs
Joomla! CMS versions 2.5.0 through 3.8.7
Solution
Upgrade to version 3.8.8
Contact
The JSST at the Joomla! Security Centre.
Reported By: Matias Aguirre, JSST
#1 - May 23, 2018, 01:07:22 PM

Members:

0 Members and 1 Guest are viewing this topic.