Szkoła Podstawowa nr 78 im. Mikołaja Kopernika

ul. Jedności Narodowej 195, 50-303 Wrocław

Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Improper Input Validation
    • Reported Date: 2020-05-07
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23131

    Description

    Missing input validation within the template manager.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Bui Duc Anh Khoa from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Insecure Randomness
    • Reported Date: 2021-01-12
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23126CVE-2021-23127

    Description

    Usage of the insecure rand() function within the process of generating the 2FA secret.
    Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes.

    Additional details as well as a more contexts for exising sites can be found in the docs: https://docs.joomla.org/J3.x:Changes_to_the_2FA_token_generation_recommendations_for_existing_sites

    This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hanno Böck
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Insecure Randomness
    • Reported Date: 2021-01-13
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23128

    Description

    The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to "random_bytes()" and its backport that is shipped within random_compat.

    This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hanno Böck
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions:2.5.0 - 3.9.24
    • Exploit type: XSS
    • Reported Date: 2020-05-07
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23129

    Description

    Missing filtering of messages showed to users that could lead to xss issues.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Bui Duc Anh Khoa from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions:3.0.0 - 3.9.24
    • Exploit type: Path Traversal
    • Reported Date: 2020-09-08
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-26028

    Description

    Extracting an specifilcy crafted zip package could write files outside of the intended path.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Šarūnas Paulauskas
Contribute!
Books!
Shop!