Security restrictions bypass in Joomla! - CVE-2018-17857

 

Security restrictions bypass in Joomla! - CVE-2018-17857

Published: October 11, 2018


Vulnerability identifier: #VU15314
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-17857
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Joomla!
Affected software:
Joomla!

Detailed vulnerability description

The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.

The vulnerability exists due to insufficient security checks of the tags search fields. A remote attacker can submit specially crafted mail using disabled forms to bypass security restrictions and conduct further attacks.


How to mitigate CVE-2018-17857

Update to version 3.8.13.

Sources