Concern

Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.0.0-3.9.19
    • Exploit type: Information Disclosure
    • Reported Date: 2020-Jun-17
    • Fixed Date: 2020-July-14
    • CVE Number: CVE-2020-15698

    Description

    Inadequate filtering in the system information screen could expose redis or proxy credentials

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.19

    Solution

    Upgrade to version 3.9.20

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Phil Taylor
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.0.0-3.9.19
    • Exploit type: XSS
    • Reported Date: 2020-Jun-08
    • Fixed Date: 2020-July-14
    • CVE Number: CVE-2020-15696

    Description

    Lack of input filtering and escaping allows XSS attacks in mod_random_image

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.19

    Solution

    Upgrade to version 3.9.20

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Phil Taylor
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.0.0-3.9.19
    • Exploit type: Incorrect Access Control
    • Reported Date: 2020-Jun-02
    • Fixed Date: 2020-July-14
    • CVE Number: CVE-2020-15697

    Description

    Internal read-only fields in the User table class could be modified by users.

    Affected Installs

    Joomla! CMS versions 3.9.0 - 3.9.19

    Solution

    Upgrade to version 3.9.20

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Phil Taylor
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.9.0-3.9.19
    • Exploit type: CSRF
    • Reported Date: 2020-May-07
    • Fixed Date: 2020-July-14
    • CVE Number: CVE-2020-15695

    Description

    A missing token check in the remove request section of com_privacy causes a CSRF vulnerability.

    Affected Installs

    Joomla! CMS versions 3.9.0 - 3.9.19

    Solution

    Upgrade to version 3.9.20

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Bui Duc Anh Khoa from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 2.5.0-3.9.19
    • Exploit type: Incorrect Access Control
    • Reported Date: 2020-April-04
    • Fixed Date: 2020-July-14
    • CVE Number: CVE-2020-15699

    Description

    Missing validation checks at the usergroups table object can result into an broken site configuration.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.9.19

    Solution

    Upgrade to version 3.9.20

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hoang Kien from VSEC

WE PROVIDE
THE MOST FLEXIBLE SOFTWARE

SEE OUR OFFER

CUSTOM
SOLUIONS

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

ACCOUNTING
SOFTWARE

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

MOBILE
APPLICATIONS

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

×

Pop Up Panel

Here is the pop up panel you can use to promote of any product or service that you think your customers should see at the very bottom of the website. You can use 6 different modules positions between intro-1 and intro-6.

FIND OUT MORE BUY TODAY!


TOP