SB2021030221 - Multiple vulnerabilities in Joomla!



SB2021030221 - Multiple vulnerabilities in Joomla!

Published: March 2, 2021 Updated: August 2, 2022

Security Bulletin ID SB2021030221
Severity
Medium
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Use of insufficiently random values (CVE-ID: CVE-2021-23126)

The vulnerability allows a remote attacker to bypass 2FA.

The vulnerability exists due to usage of the insecure rand() function within the process of generating the 2FA secret. A remote attacker can guess 2FA token and bypass authentication process.


2) Use of insufficiently random values (CVE-ID: CVE-2021-23127)

The vulnerability allows a remote attacker to bypass 2FA.

The vulnerability exists due to usage of the insecure rand() function within the process of generating the 2FA secret. A remote attacker can guess 2FA token and bypass authentication process.


3) Improper access control (CVE-ID: CVE-2021-26029)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within com_fields, com_categories, com_banners, com_contact, com_newsfeeds and com_tags components. A remote user can bypass implemented security restrictions and overwrite the author field.


4) Path traversal (CVE-ID: CVE-2021-26028)

The vulnerability allows a remote user to overwrite files on the system

The vulnerability exists due to input validation error when processing directory traversal sequences within zip archives. A remote user can pass specially crafted .zip file to the application and write files outside of the intended path.


5) Improper access control (CVE-ID: CVE-2021-26027)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and perform unauthorized change of the category for an article.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-23132)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists within the com_media component. A remote attacker can use a specially crafted HTTP request and upload images to paths that are not intended for image uploads.


7) Code Injection (CVE-ID: CVE-2021-23131)

The vulnerability allows a remote user to inject certain data into templates.

The vulnerability exists due to improper input validation within the template manager. A remote user  can send a specially crafted request and execute code into templates.



8) Cross-site scripting (CVE-ID: CVE-2021-23130)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the feed parser library. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


9) Cross-site scripting (CVE-ID: CVE-2021-23129)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within alert messages, displayed to users. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


10) Use of insufficiently random values (CVE-ID: CVE-2021-23128)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to Joomla! core contains randval implementation within FOF (FOFEncryptRandval), used an potential insecure implemetation. A remote attacker can bypass certain security restrictions, that rely on randomization.


Remediation

Install update from vendor's website.