-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3125
                Joomla! hardens contact form in com_contact
                              15 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Joomla!
Publisher:         Joomla!
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Unauthorised Access -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15028  

Original Bulletin: 
   https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html

- --------------------------BEGIN INCLUDED TEXT--------------------

[20190801] - Core - Hardening com_contact contact form

  * Project: Joomla!
  * SubProject: CMS
  * Impact: Moderate
  * Severity: Low
  * Versions: 1.6.2 - 3.9.10
  * Exploit type: Incorrect Access Control
  * Reported Date: 2019-April-09
  * Fixed Date: 2019-August-13
  * CVE Number: CVE-2019-15028

Description
Inadequate checks in com_contact could allowed mail submission in disabled
forms.

Affected Installs
Joomla! CMS versions 1.6.2 - 3.9.10

Solution
Upgrade to version 3.9.11

Contact
The JSST at the Joomla! Security Centre.

Reported By: Sergey Brester

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXVTguGaOgq3Tt24GAQhiDhAAoAiQ21kM8WEf3+4ENTWjOozpmROgZBPf
Yj6pShCMoQPDAnXtU3vAFl3aKTreWsytjS5ALiWhMqMDXtoBMFl8gJ3zt9R1LDbZ
YPNweaLlOnsjm/17JfWcUPFfFkYS0bx+hxEUBu2LUHIi33Ro548rSWYloKlw0jUQ
RKegvykUNWvBoUxGjfjRSOgb06HnsxsaSF0XFAtLKcllIGkfBiU8ARD0OixvoHLz
K0DCi58D8vuSN2B28v2nhLc8smtP3hs9cMkuvPLDP+IR5AC8keMYKPInhUHYEioM
olLgh5iCkf2D8r4hyHTBDS04FdThy6Sc0vJUNvQT3t7Nn7rQu+QMMdg7pQdxex1Q
44beWpGy4nGZdZbslPl/aXTAYmgbgX9GY1hA9vdZzD32YBBzSRbd3DsW2VE/DNk9
MyjiN4uRG/yegwweEt1q8siFtz9qHlS0V06BHzrSVdsfHLAAbAJvmkK9FsH+rMHP
+SY/kIKcCt2617fO/Au2TgVv5zss4uPvQJ1AB7trpEpoa0aAfrNV6e0hx0sbKNvX
GFWJIJm/Ikkth+bBwPi6CvzvNZihZ7lQl9HA8hWM6nDB2Q697sRzAAYJAiRdxKsu
kUpsFkwN51eAd5nEywxwBiHERGpFQ/pNy9ACKHyorCRC6lanDGC4qZ4oPuG2bHWB
Qc9scgn1SU8=
=J2LX
-----END PGP SIGNATURE-----