CERT-In Vulnerability Note
CIVN-2016-0324
Multiple vulnerabilities in Joomla
Original Issue Date:December 28, 2016
Severity Rating: HIGH
Software Affected
- Joomla CMS versions 1.6.0 through 3.6.4
Overview
Multiple vulnerabilities have been reported in Joomla, which could be exploited by remote attacker to obtain sensitive information and execute arbitrary code on the targeted system.
Description
1. Privilege Escalation Vulnerability
(
CVE-2016-9838
)
This vulnerability exists in components/com_users/models/registration.php due to incorrect filtering of registration form data stored to the session on a validation error. Successful exploitation of this vulnerability could allow an attacker to gain access to a registered users account and reset the username and password.
2. Arbitrary File Upload Vulnerability
(
CVE-2016-9836
)
This vulnerability exists due to inadequate filesystem check mechanism of JFilterInput::is FileSafe() that does not consider other substitute PHP file extensions when checking uploaded files for PHP content. Successful exploitation of this vulnerability could allow an attacker to upload and execute arbitrary files of extensions ".php6", ".php7", ".phtml", and ".phpt" to the affected computer this may result in arbitrary code execution.
3. Information Disclosure Vulnerability
(
CVE-2016-9837
)
This vulnerability exists due to inadequate ACL checks in the Beez3 layout override of the com_content article. Successful exploitation of this vulnerability could allow an attacker to gain access to sensitive information that may aid in further attacks.
Solution
Upgrade to latest version as mentioned in:
https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html
Vendor Information
Joomla
https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html
References
Joomla
https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html
Security focus
http://www.securityfocus.com/bid/94893
http://www.securityfocus.com/bid/94892
http://www.securityfocus.com/bid/94663
CVE Name
CVE-2016-9838
CVE-2016-9836
CVE-2016-9837
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|