Cybersecurity specialists reported the finding of multiple vulnerabilities in Joomla, one of the most popular content management systems (CMS). According to the report, the successful exploitation of these vulnerabilities would allow cross-site script forgery attacks, access to sensitive information, defacing of affected websites, among others.
Below are brief overviews of reported vulnerabilities, in addition to their respective scores and tracking keys according to the Common Vulnerability Scoring System (CVSS). It should be remembered that some of these flaws do not have a CVSS key assigned.
- Insufficient validation of the origin of the HTTP request within the endpoint com_installer ajax_install would allow remote hackers to deploy cross-site request forgery (XSRF) attacks by directing users to malicious sites. This flaw received a score of 5.3/10.
- The absence of validation checks on the user pool table object allows remote hackers to gain access to restricted functions on the target system. Tracked as CVE-2020-15699, the flaw received a score of 2.4/10.
- Insufficient validation of the origin of HTTP requests in the delete request function would com_privacy allow remote threat actors to deploy XSRF attacks using a specially designed website. The vulnerability was tracked as CVE-2020-15695 and received a score of 5.3/10.
- Weak restrictions on access to the vulnerable system would allow threat actors to modify internal read-only fields in the User table class. The flaw was tracked as CVE-2020-15697 and received a score of 3.8/10.
- Insufficient disinfection of user-provided data passed through the link mod_random_image would allow threat actors to deploy cross-site scripting (XSS) attacks using a specially designed website. The flaw received a score of 5.3/10 and was tracked as CVE-2020-15696.
- Excessive data output by the application via the system information screen allows remote hackers to gain access to sensitive information. The vulnerability was tracked as CVE-2020-15698 and received a score of 4.6/10.
Although the flaws can be exploited remotely by unauthenticated threat actors, CMS security teams have not identified attempts at active exploitation, or the existence of a malware variant associated with the attacks.
Joomla has already released the necessary fixes, so users should only install the updates. The full list of vulnerable versions of Joomla is available on the company’s website.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.