Joomla! 3.x < 3.2.3 Multiple Vulnerabilities

critical Nessus Plugin ID 73025

Synopsis

The remote web server contains a PHP application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the Joomla! installation running on the remote web server is 3.x prior to 3.2.3.
It is, therefore, affected by multiple vulnerabilities :

- A SQL injection vulnerability exists within weblinks-categories due to improper sanitization of user-supplied input to the category 'ID' parameter before using it in SQL queries. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data.
(CVE-2014-7981)

- An unspecified cross-site scripting (XSS) vulnerability exists due to improper validation of input before returning it to users. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2014-7982)

- A cross-site scripting (XSS) vulnerability exists within the index.php/single-contact script due to improper validation of input to the 'jform[contact_email]' POST parameter before returning it to users. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2014-7983)

- A security bypass vulnerability exists that allows a remote attacker to bypass intended restrictions and log into the system using GMail credentials. (CVE-2014-7984)

- A SQL injection vulnerability exists in the ModTagssimilarHelper::getList() function within file modules/mod_tags_similar/helper.php due to improper sanitization of user-supplied input before using it in SQL queries. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Joomla! version 3.2.3 or later.

See Also

http://www.nessus.org/u?559a3e03

http://www.nessus.org/u?356cb20e

http://www.nessus.org/u?e5e7e44a

http://www.nessus.org/u?47f311a4

http://www.nessus.org/u?b9bf48e7

Plugin Details

Severity: Critical

ID: 73025

File Name: joomla_323.nasl

Version: 1.24

Type: remote

Family: CGI abuses

Published: 3/14/2014

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: installed_sw/Joomla!, www/PHP, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/6/2014

Vulnerability Publication Date: 2/6/2014

Reference Information

CVE: CVE-2014-7981, CVE-2014-7982, CVE-2014-7983, CVE-2014-7984

BID: 77808, 80037, 80051, 80065

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990