SB2021030221 - Multiple vulnerabilities in Joomla!
Published: March 2, 2021 Updated: August 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Use of insufficiently random values (CVE-ID: CVE-2021-23126)
The vulnerability allows a remote attacker to bypass 2FA.
The vulnerability exists due to usage of the insecure rand() function within the process of generating the 2FA secret. A remote attacker can guess 2FA token and bypass authentication process.
2) Use of insufficiently random values (CVE-ID: CVE-2021-23127)
The vulnerability allows a remote attacker to bypass 2FA.
The vulnerability exists due to usage of the insecure rand() function within the process of generating the 2FA secret. A remote attacker can guess 2FA token and bypass authentication process.
3) Improper access control (CVE-ID: CVE-2021-26029)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within com_fields, com_categories, com_banners, com_contact, com_newsfeeds and com_tags components. A remote user can bypass implemented security restrictions and overwrite the author field.
4) Path traversal (CVE-ID: CVE-2021-26028)
The vulnerability allows a remote user to overwrite files on the system
The vulnerability exists due to input validation error when processing directory traversal sequences within zip archives. A remote user can pass specially crafted .zip file to the application and write files outside of the intended path.
5) Improper access control (CVE-ID: CVE-2021-26027)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and perform unauthorized change of the category for an article.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-23132)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists within the com_media component. A remote attacker can use a specially crafted HTTP request and upload images to paths that are not intended for image uploads.
7) Code Injection (CVE-ID: CVE-2021-23131)
The vulnerability allows a remote user to inject certain data into templates.
The vulnerability exists due to improper input validation within the template manager. A remote user can send a specially crafted request and execute code into templates.
8) Cross-site scripting (CVE-ID: CVE-2021-23130)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within the feed parser library. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Cross-site scripting (CVE-ID: CVE-2021-23129)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within alert messages, displayed to users. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
10) Use of insufficiently random values (CVE-ID: CVE-2021-23128)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to Joomla! core contains randval implementation within FOF (FOFEncryptRandval), used an potential insecure implemetation. A remote attacker can bypass certain security restrictions, that rely on randomization.
Remediation
Install update from vendor's website.
References
- https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html
- https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-overwrite-the-author-field.html
- https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html
- https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html
- https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-uploads.html
- https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html
- https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html
- https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html
- https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html