Joomla! 1.7.x < 3.9.23 Multiple Vulnerabilities

High Web Application Scanning Plugin ID 112666


Joomla! 1.7.x < 3.9.23 Multiple Vulnerabilities


According to its self-reported version, the instance of Joomla! running on the remote web server is 1.7.x prior to 3.9.23. It is, therefore, affected by multiple vulnerabilities.

- The autosuggestion feature of com_finder did not respect the access level of the corresponding terms.

- The globlal configuration page does not remove secrets from the HTML output, disclosing the current values.

- The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.

- Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.

- Improper handling of the username leads to a user enumeration attack vector in the backend login page.

- A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.

- Lack of input validation while handling ACL rulesets can cause write ACL violations.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.


Update to Joomla! version 3.9.23 or latest.

See Also

Plugin Details

Severity: High

ID: 112666

Type: remote

Published: 2021/01/15

Updated: 2021/01/15

Scan Template: api, scan, pci

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

Exploit Available: false

Patch Publication Date: 2020/11/24

Vulnerability Publication Date: 2020/11/24

Reference Information

CVE: CVE-2020-35610, CVE-2020-35611, CVE-2020-35612, CVE-2020-35613, CVE-2020-35614, CVE-2020-35615, CVE-2020-35616