Concern

Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Versions: 2.5.0 - 3.9.13
    • Exploit type: SQL injection
    • Reported Date: 2019-December-01
    • Fixed Date: 2019-December-17
    • CVE Number: CVE-2019-19846

    Description

    The lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.

    Affected Installs

    Joomla! CMS versions 2.5.0 - 3.9.13

    Solution

    Upgrade to version 3.9.14

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: ka1n4t
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.8.0 - 3.9.13
    • Exploit type: Path Disclosure
    • Reported Date: 2019-November-22
    • Fixed Date: 2019-December-17
    • CVE Number: CVE-2019-19845

    Description

    Missing access check in framework files could lead to a path disclosure.

    Affected Installs

    Joomla! CMS versions 3.8.0 - 3.9.13

    Solution

    Upgrade to version 3.9.14

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Lee Thao, Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions: 3.6.0 - 3.9.12
    • Exploit type: Path Disclosure
    • Reported Date: 2019-November-01
    • Fixed Date: 2019-November-05
    • CVE Number: CVE-2019-18674

    Description

    Missing access check in the phputf8 mapping files could lead to an path disclosure.

    Affected Installs

    Joomla! CMS versions 3.6.0 - 3.9.12

    Solution

    Upgrade to version 3.9.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Phil Taylor
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Versions: 3.2.0-3.9.12
    • Exploit type: CSRF
    • Reported Date: 2019-October-10
    • Fixed Date: 2019-November-05
    • CVE Number: CVE-2019-18650

    Description

    A missing token check in com_template causes a CSRF vulnerability.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.12

    Solution

    Upgrade to version 3.9.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Lee Thao from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 3.0.0-3.9.11
    • Exploit type: XSS
    • Reported Date: 2019-August-28
    • Fixed Date: 2019-September-24
    • CVE Number: CVE-2019-16725

    Description

    Inadequate escaping allowed XSS attacks using the logo parameter of the default templates.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.11

    Solution

    Upgrade to version 3.9.12

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Aswin M Guptha

WE PROVIDE
THE MOST FLEXIBLE SOFTWARE

SEE OUR OFFER

CUSTOM
SOLUIONS

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

ACCOUNTING
SOFTWARE

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

MOBILE
APPLICATIONS

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

×

Pop Up Panel

Here is the pop up panel you can use to promote of any product or service that you think your customers should see at the very bottom of the website. You can use 6 different modules positions between intro-1 and intro-6.

FIND OUT MORE BUY TODAY!


TOP