Joomla Update Blog

Most if not all issues with Joomla installations have to do with not timely update your Joomla version, below you will find the standard Security RSS feed of Joomla; these are only the updates you may need for the CORE of the software, not for any additional plugins you may have installed. It is important to always check your CORE Joomla files but do not forget your added components or plugins. Also always remove any unused components, themes or plugins for any installation (Joomla or any other software product).

\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Low\r\nVersions: 1.6.0 through 3.8.8\r\nExploit type: XSS\r\nReported Date: 2018-May-07\r\nFixed Date: 2018-June-26\r\nCVE Number: CVE-2018-12711\r\n\r\nDescription\r\nIn some cases the link of the current language might contain unescaped HTML special characters. This may lead to reflective XSS via injection of arbitrary parameters and/or values on the current page url.\r\nAffected Installs\r\nJoomla! CMS versions 1.6.0 through 3.8.8\r\nSolution\r\nUpgrade to version 3.8.9\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Borja Lorenzo, Innotecsystem
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Low\r\nVersions: 2.5.0 through 3.8.8\r\nExploit type: LFI\r\nReported Date: 2018-April-23\r\nFixed Date: 2018-June-26\r\nCVE Number: CVE-2018-12712\r\n\r\nDescription\r\nOur autoload code checks classnames to be valid, using the \"class_exists\" function in PHP. In PHP 5.3 this function validates invalid names as valid, which can result in a Local File Inclusion.\r\nAffected Installs\r\nJoomla! CMS versions 2.5.0 through 3.8.8\r\nSolution\r\nUpgrade to version 3.8.9\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Davide Tampellini
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Low\r\nVersions: 1.5.0 through 3.8.7\r\nExploit type: XSS\r\nReported Date: 2017-October-28\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-6378\r\n\r\nDescription\r\nInadequate filtering of file and folder names lead to various XSS attack vectors in the media manager.\r\nAffected Installs\r\nJoomla! CMS versions 1.5.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: David Jardin, JSST
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Low\r\nVersions: 3.1.2 through 3.8.7\r\nExploit type: XSS\r\nReported Date: 2018-March-30\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11328\r\n\r\nDescription\r\nUnder specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in a XSS vulnerability.\r\nAffected Installs\r\nJoomla! CMS versions 3.1.2 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: David Jardin, JSST
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Medium\r\nSeverity: Low\r\nVersions: 3.0.0 through 3.8.7\r\nExploit type: Session race condition\r\nReported Date: 2017-July-08\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11324\r\n\r\nDescription\r\nA long running background process, such as remote checks for core or extension updates, could create a race condition where a session which was expected to be destroyed would be recreated.\r\nAffected Installs\r\nJoomla! CMS versions 3.0.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nAdditional Resources\r\n\r\n\r\nMore details about the Session deletion race condition\r\n\r\n\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: David Jardin, JSST
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Moderate\r\nSeverity: Low\r\nVersions: 3.7.0 through 3.8.7\r\nExploit type: Remote Code Execution\r\nReported Date: 2018-May-14\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11321\r\n\r\nDescription\r\nInadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.\r\nAffected Installs\r\nJoomla! CMS versions 3.7.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Benjamin Trenkle, JSST
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Moderate\r\nSeverity: Moderate\r\nVersions: 3.0.0 through 3.8.7\r\nExploit type:XSS\r\nReported Date:2018-February-02 & 2018-March-27\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11326\r\n\r\nDescription\r\nInadequate input filtering leads to multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.\r\nAffected Installs\r\nJoomla! CMS versions 3.0.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nAdditional Resources\r\n\r\nYou can find more details and other default changes in 3.8.8 at the Documentation.\r\n\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Kai Zhao of 3H Security Team & Zhouyuan Yang (FortiGuard Labs)
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Low\r\nVersions: 3.0.0 through 3.8.7\r\nExploit type: Information Disclosure\r\nReported Date: 2018-February-09\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11325\r\n\r\nDescription\r\nThe web install application would autofill password fields after either a form validation error or navigating to a previous install step, and displays the plain text password for the administrator account at the confirmation screen.\r\nAffected Installs\r\nJoomla! CMS versions 3.0.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Sascha Egerer
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: Low\r\nSeverity: Moderate\r\nVersions: 3.1.0 through 3.8.7\r\nExploit type: Information Disclosure\r\nReported Date: 2018-April-27\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11327\r\n\r\nDescription\r\nInadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission .\r\nAffected Installs\r\nJoomla! CMS versions 3.1.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Phil Taylor, JSST
\r\nProject: Joomla!\r\nSubProject: CMS\r\nImpact: High\r\nSeverity: Low\r\nVersions: 2.5.0 through 3.8.7\r\nExploit type: Malicious file upload\r\nReported Date: 2018-March-14\r\nFixed Date: 2018-May-22\r\nCVE Number: CVE-2018-11322\r\n\r\nDescription\r\nDepending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.\r\nAffected Installs\r\nJoomla! CMS versions 2.5.0 through 3.8.7\r\nSolution\r\nUpgrade to version 3.8.8\r\nContact\r\nThe JSST at the Joomla! Security Centre.\r\nReported By: Demis Palma, JSST