Joomla! 3.6.x < 3.6.5 Multiple Vulnerabilities

critical Web App Scanning Plugin ID 98403

Synopsis

Joomla! 3.6.x < 3.6.5 Multiple Vulnerabilities

Description

According to its self-reported version number, the detected Joomla! application is affected by multiple vulnerabilities :

- A flaw exists in the JFilterInput::isFileSafe() function due to improper validation of file types and extensions of uploaded files before placing them in a user-accessible path. An unauthenticated, remote attacker can exploit this issue, by uploading a specially crafted file using an alternative PHP extension and then requesting it, to execute arbitrary code with the privileges of the web service. Note that this issue affects versions 3.0.0 to 3.6.4. (CVE-2016-9836)

- An information disclosure vulnerability exists in the Beez3 com_content article layout override due to inadequate access control list (ACL) checks. An authenticated, remote attacker can exploit this to disclose restricted content. Note that this issue affects versions 3.0.0 to 3.6.4. (CVE-2016-9837)

- A privilege escalation vulnerability exists due to improper validation of form data before storing it in the session. An authenticated, remote attacker can exploit this, via a specially crafted request, to modify existing user accounts, such as resetting credentials or group assignments. (CVE-2016-9838)

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update to Joomla! version 3.6.5 or latest.

See Also

https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html

https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html

https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html

https://developer.joomla.org/security-centre/667-20161204-misc-security-hardening.html

https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html

Plugin Details

Severity: Critical

ID: 98403

Type: remote

Published: 11/5/2018

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-9836

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2016-9836

Vulnerability Information

CPE: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/5/2016

Vulnerability Publication Date: 12/5/2016

Reference Information

CVE: CVE-2016-9836, CVE-2016-9837, CVE-2016-9838

BID: 94663, 94892, 94893