-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0190
        Joomla Security Announcements: 20210101, 20210102, 20210103
                              15 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Joomla! Core
Publisher:         Joomla project
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Unknown/Unspecified         
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23125 CVE-2021-23124 CVE-2021-23123

Original Bulletin: 
   http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/R649UlnsWcE/836-20210101-core-com-modules-exposes-module-names.html
   http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K1E_p7cgYyI/837-20210102-core-xss-in-mod-breadcrumbs-aria-label-attribute.html
   http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/bx6liB_wMaw/838-20210103-core-xss-in-com-tags-image-parameters.html

Comment: This bulletin contains three (3) Joomla project security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

[20210101] - Core - com_modules exposes module names

Project: Joomla!
SubProject: CMS
Impact: Low
Severity: Low
Versions: 3.0.0 - 3.9.23
Exploit type: Incorrect Access Control
Reported Date: 2020-07-07
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23123

Description

Lack of ACL checks in the order Position endpoint of com_modules leak names  
of unpublished and/or inaccessible modules.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.23

Solution

Upgrade to version 3.9.24

Contact

The JSST at the Joomla! Security Centre.
Reported By: Phil Taylor


- --------------------------------------------------------------------------------


[20210102] - Core - XSS in mod_breadcrumbs aria-label attribute

Project: Joomla!
SubProject: CMS
Impact: Moderate
Severity: Low
Versions:3.9.0 - 3.9.23
Exploit type: XSS
Reported Date: 2020-09-01
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23124

Description

Lack of escaping in mod_breadcrumbs aria-label attribute allows XSS attacks.

Affected Installs

Joomla! CMS versions 3.9.0 - 3.9.23

Solution

Upgrade to version 3.9.24

Contact

The JSST at the Joomla! Security Centre.
Reported By: Sarunas Paulauskas


- --------------------------------------------------------------------------------


[20210103] - Core - XSS in com_tags image parameters

Project: Joomla!
SubProject: CMS
Impact: Moderate
Severity: Low
Versions:3.1.0 - 3.9.23
Exploit type: XSS
Reported Date: 2020-09-01
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23125

Description

Lack of escaping of image-related parameters in multiple com_tags views  
cause lead to XSS attack vectors.

Affected Installs

Joomla! CMS versions 3.1.0 - 3.9.23

Solution

Upgrade to version 3.9.24

Contact

The JSST at the Joomla! Security Centre.
Reported By: Sarunas Paulauskas

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Zxoc
-----END PGP SIGNATURE-----