SB2022032920 - Multiple vulnerabilities in Joomla!
Published: March 29, 2022 Updated: March 30, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2022-23801)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing SVG images in com_media. A remote attacker can upload a malicious SVG image and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2022-23800)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Code Injection (CVE-ID: CVE-2022-23799)
The vulnerability allows a remote attacker to manipulate the original query.
The vulnerability exists due to improper input validation when handling parameters of HTTP requests. Under specific circumstances, JInput pollutes method-specific input bags with $_REQUEST data. A remote attacker can send a specially crafted request and bypass intended security restrictions.
4) Open redirect (CVE-ID: CVE-2022-23798)
The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
5) SQL injection (CVE-ID: CVE-2022-23797)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
6) Cross-site scripting (CVE-ID: CVE-2022-23796)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within the com_fields class. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
7) Improper Authentication (CVE-ID: CVE-2022-23795)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to a user row is not bound to a specific authentication mechanism. A remote attacker can bypass authentication process and takeover accounts of other web application users under specific circumstances.
8) Information disclosure (CVE-ID: CVE-2022-23794)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application when errors during handling file uploads. A remote attacker can gain pass a large file to the web application and obtain information about its installation directory.
9) Path traversal (CVE-ID: CVE-2022-23793)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in filenames inside .zip archives. A remote attacker can send a specially crafted archive to the web application and write files outside of the intended path.
Remediation
Install update from vendor's website.
References
- https://developer.joomla.org/security-centre/878-20220309-core-xss-attack-vector-through-svg.html
- https://developer.joomla.org/security-centre/877-20220308-core-inadequate-content-filtering-within-the-filter-code.html
- https://developer.joomla.org/security-centre/876-20220307-core-variable-tampering-on-jinput-request-data.html
- https://developer.joomla.org/security-centre/875-20220306-core-inadequate-validation-of-internal-urls.html
- https://developer.joomla.org/security-centre/874-20220305-core-inadequate-filtering-on-the-selected-ids.html
- https://developer.joomla.org/security-centre/873-20220304-core-missing-input-validation-within-com-fields-class-inputs.html
- https://developer.joomla.org/security-centre/872-20220303-core-user-row-are-not-bound-to-a-authentication-mechanism.html
- https://developer.joomla.org/security-centre/871-20220302-core-path-disclosure-within-filesystem-error-messages.html
- https://developer.joomla.org/security-centre/870-20220301-core-zip-slip-within-the-tar-extractor.html
- https://seclists.org/fulldisclosure/2022/Mar/60