FreeBSD : joomla -- multiple vulnerabilities (a9f60ce8-a4e0-11e5-b864-14dae9d210b8)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The JSST and the Joomla! Security Center report : [20151201] - Core -
Remote Code Execution Vulnerability Browser information is not
filtered properly while saving the session values into the database
which leads to a Remote Code Execution vulnerability. [20151202] -
Core - CSRF Hardening Add additional CSRF hardening in com_templates.
[20151203] - Core - Directory Traversal Failure to properly sanitize
input data from the XML install file located within an extension's
package archive allows for directory traversal. [20151204] - Core -
Directory Traversal Inadequate filtering of request data leads to a
Directory Traversal vulnerability.

See also :

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 87483 ()

Bugtraq ID:

CVE ID: CVE-2015-8562

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now