ESB-2019.1285 - [Win][UNIX/Linux] Joomla!: Multiple vulnerabilities 2019-04-15

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1285
         Multiple vulnerabilities have been identified in Joomla!
                               15 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Joomla!
Publisher:         Joomla!
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Remote/Unauthenticated      
                   Unauthorised Access      -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-10946 CVE-2019-10945 

Original Bulletin: 
   https://developer.joomla.org/security-centre/779-20190403-core-object-prototype-pollution-in-jquery-extend.html
   https://developer.joomla.org/security-centre/778-20190402-core-helpsites-refresh-endpoint-callable-for-unauthenticated-users.html
   https://developer.joomla.org/security-centre/777-20190401-core-directory-traversal-in-com-media.html

Comment: This bulletin contains three (3) Joomla! security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

[20190403] - Core - Object.prototype pollution in JQuery $.extend

    Project: Joomla!
    SubProject: CMS
    Impact: Low
    Severity: Moderate
    Versions: 3.0.0 through 3.9.4
    Exploit type: XSS
    Reported Date: 2019-March-25
    Fixed Date: 2019-April-09
    CVE Number: TBA

Description

The $.extend method of JQuery is vulnerable to Object.prototype pollution 
attacks.

Affected Installs

Joomla! CMS versions 3.0.0 through 3.9.4

Solution

Upgrade to version 3.9.5

Contact

The JSST at the Joomla! Security Centre.
Reported By: Michal Golebiowski-Owczarek, David Jardin 
(JSST)

- ---

[20190402] - Core - Helpsites refresh endpoint callable for unauthenticated 
users

    Project: Joomla!
    SubProject: CMS
    Impact: Low
    Severity: High
    Versions: 3.2.0 through 3.9.4
    Exploit type: ACL Violation
    Reported Date: 2019-March-13
    Fixed Date: 2019-April-08
    CVE Number: CVE-2019-10946

Description

The "refresh list of helpsites" endpoint of com_users lacks access checks, 
allowing calls from unauthenticated users.

Affected Installs

Joomla! CMS versions 3.2.0 through 3.9.4

Solution

Upgrade to version 3.9.5

Contact

The JSST at the Joomla! Security Centre.
Reported By: Benjamin Trenkle (JSST)

- ---

[20190401] - Core - Directory Traversal in com_media

    Project: Joomla!
    SubProject: CMS
    Impact: Moderate
    Severity: Low
    Versions: 1.5.0 through 3.9.4
    Exploit type: Directory Traversal
    Reported Date: 2019-March-13
    Fixed Date: 2019-April-08
    CVE Number: CVE-2019-10945

Description

The Media Manager component does not properly sanitise the folder 
parameter, allowing attackers to act outside the media manager root 
directory.

Affected Installs

Joomla! CMS versions 1.5.0 through 3.9.4

Solution

Upgrade to version 3.9.5

Contact

The JSST at the Joomla! Security Centre.
Reported By: Haboob Research Team

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=5RYV
-----END PGP SIGNATURE-----

« Back to bulletins