Urgent Joomla Update: Addressing the High-Risk CVEs Exploitable for Arbitrary Code Execution

by | Feb 23, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

In a recent revelation, Joomla, the popular content management system (CMS), has been found susceptible to five critical vulnerabilities, each posing a severe risk of arbitrary code execution on compromised websites. These vulnerabilities, impacting multiple versions of Joomla, have prompted immediate action from the vendor, resulting in fixes included in versions 5.0.3 and 4.4.3 of the CMS.

Outlined by their respective Common Vulnerabilities and Exposures (CVE) identifiers, the vulnerabilities are as follows:

  • CVE-2024-21722: Failure to properly terminate existing user sessions when modifying multi-factor authentication (MFA) methods.
  • CVE-2024-21723: Insufficient URL parsing leading to potential open redirects.
  • CVE-2024-21724: Inadequate input validation for media selection fields resulting in cross-site scripting (XSS) vulnerabilities across various extensions.
  • CVE-2024-21725: Insufficient escaping of email addresses leading to XSS vulnerabilities in multiple components.
  • CVE-2024-21726: Deficient content filtering within the core filter component, culminating in multiple XSS vulnerabilities.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Of these vulnerabilities, CVE-2024-21725 has been highlighted by Joomla’s advisory as the most severe, with a high probability of exploitation.

Additionally, CVE-2024-21726, categorized as an XSS flaw within Joomla’s core filter component, presents a moderate severity risk. However, vulnerability researcher Stefan Schiller from Sonar warns that it could still facilitate remote code execution, amplifying its threat potential.

Schiller explains, “Attackers can leverage the issue to gain remote code execution by tricking an administrator into clicking on a malicious link.”




Exploitation of XSS flaws typically necessitates user interaction, typically requiring an administrator to interact with a malicious link. Despite this reliance on user interaction, attackers often employ sophisticated lures or resort to indiscriminate “spray-and-pray” tactics to maximize their chances of success.

While technical details regarding the vulnerabilities have not been disclosed by Sonar to facilitate swift patching, Schiller emphasizes the criticality of prompt action, urging all Joomla users to update to the latest version immediately to mitigate these risks effectively.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This