DoD-Cyber-Security-Blogs Joomla

Joomla fixes XSS vulnerabilities that could make RCE attacks possible on websites.

The Joomla content management system has five vulnerabilities that could be used to program arbitrary code on websites that are vulnerable.

Versions&nbsp, 5.0.3 and 4.4.3 of the CMS have fixes, and the vendor has fixed the security problems that affect various Joomla versions.

    When a user’s MFA methods have been changed, CVE-2024-21722 does not properly end existing user sessions.

  • CVE-2024-21723: Insufficient URL parsing may cause an open redirect.
  • Cross-site scripting ( XSS) vulnerabilities in various extensions are caused by inadequate input validation for media selection fields in CVE-2024-21724.
  • CVE-2024-21725: A number of components have XSS vulnerabilities as a result of insufficient mail address escaping.
  • CVE-2024-21726: Multiple XSS are caused by insufficient content filtering within the filter code.

According to Joomla’s advisory, the vulnerability with the highest severity risk and highest likelihood of exploitation is CVE-2024-21725.

Risk of remote code execution

Another problem with Joomla’s core filter component is an XSS that is marked as CVE-2024-21726. Although it has a low severity and likelihood of being exploited, Sonar’s code inspection tools provider Stefan Schiller warns that remote code execution may be possible using it.

Hackers can take advantage of the vulnerability to trick an administrator into clicking on a malicious link, according to Schiller.

Flaws in XSS&nbsp can enable attackers to insert malicious scripts into content provided to other users, usually allowing the victim’s browser to run unsafe code.

User interaction is necessary to take advantage of the problem. To get someone to click on a malicious link, an attacker would need to use administrator privileges and nbsp.

Although user interaction lessens the vulnerability’s severity, attackers are still able to create effective lures. They can also use so-called” spray-and-pray” attacks, which expose a larger audience to malicious links in the hopes that some users will click them.

To make it easier for more Joomla admins to apply the available security updates, Sonar withheld any technical information about the flaw or how it can be exploited.

In the alert, Schiller emphasizes that all Joomla users should update to the most recent version, even though we wo n’t be disclosing technical details at this time.

Skip to content