Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2016.0122 A number of vulnerabilities have been identified in Joomla! 23 December 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Joomla! Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Administrator Compromise -- Remote/Unauthenticated Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-8869 CVE-2016-8870 CVE-2016-9081 CVE-2016-9836 CVE-2016-9837 CVE-2016-9838 Member content until: Saturday, January 21 2017 OVERVIEW Multiple vulnerabilities affect the following packages: 1.6.0 <= joomla3 < 3.6.1[1] 1.5.0 <= joomla3 < 3.4.7[2] 3.4.4 <= joomla3 < 3.6.4[3] 1.6.0 <= joomla3 < 3.6.5[4] IMPACT The vendor has provided the following information: "[20160801] - Core - ACL Violation Inadequate ACL checks in com_content provide potential read access to data which should be access restricted to users with edit_own level. https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html [20160802] - Core - XSS Vulnerability Inadequate escaping leads to XSS vulnerability in mail component. https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html [20160803] - Core - CSRF Add additional CSRF hardening in com_joomlaupdate. https://developer.joomla.org/security-centre/654-20160803-core-csrf.html "[1] "[20151206] - Core - Session Hardening The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions. https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html [20151207] - Core - SQL Injection Inadequate filtering of request data leads to a SQL Injection vulnerability. https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html "[2] "[20161001] - Core - Account Creation Inadequate checks allows for users to register on a site when registration has been disabled. https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html [20161002] - Core - Elevated Privilege Incorrect use of unfiltered data allows for users to register on a site with elevated privileges. https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html [20161003] - Core - Account Modifications Incorrect use of unfiltered data allows for existing user accounts to be modified; to include resetting their username, password, and user group assignments. https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html "[3] "[20161201] - Core - Elevated Privileges Incorrect use of unfiltered data stored to the session on a form validation failure allows for existing user accounts to be modified; to include resetting their username, password, and user group assignments. https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html [20161202] - Core - Shell Upload Inadequate filesystem checks allowed files with alternative PHP file extensions to be uploaded. https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html [20161203] - Core - Information Disclosure Inadequate ACL checks in the Beez3 com_content article layout override enables a user to view restricted content. https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html "[4] MITIGATION The vendor recommends updating to the latest version of Joomla! to correct these issues. [1 - 4] REFERENCES [1] Joomla! -- multiple vulnerabilities http://www.vuxml.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html [2] Joomla! -- multiple vulnerabilities http://www.vuxml.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html [3] Joomla! -- multiple vulnerabilities http://www.vuxml.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html [4] Joomla! -- multiple vulnerabilities http://www.vuxml.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWFxw1Ix+lLeg9Ub1AQgHxxAAiM3NreOJGj5v2WcNCkgN2AYY3XQiuORd o1B5KSl1FQvJN7IOxwaFzAaTNwxev88/+l09UwQl9QYnOzBW8tGvU0obq75ZPCpE NtIZx7fTHZG02M+l81DDD3j9gptkL1Wdh4VVexxcMW29cVDwfrop+aNKpUfmD2Vl nBlUi3bbUow4QE/l1italbIrxic3EJi6Y37WHIIUOZyxNWVlYTOxyV6wbPGMG9gF EojwlTCSCVeQnjQvS8HS6ctwuwPBNd/SRGX8nwrRAZA3PD0ASU/azfLGqGe29/oD GcKyC/M5Xq0/oKAm2+B37jzL+geKrDS6fvt6rfUK2Yvkrs9FkLLZmcVvGHTIVUnu eAieiBYzH7DIADp705fdNJP8ZvO4Id74Auh+Qi/gJzECDqnMiOg45pt/ZHLV87r+ quk4Tii+Z0zcs3cwaTadP23Eh2ExZ397WUxaeesxSZN4FwzKB1Y/mXaTYVan2+Jx ZwWfOOMNfH/WQr91b+AIZKMyJly3x6AJH7ZBLamnySzNCugrRINHZS2BgIkfJ3pk u8V6NxxNCET1Cyx6cz1CqnhY1FkTY7jgecw8mVFiBrjS+x1QIMg1acq9fPgPBa/6 EfbpY7mxgGp4VJfrhyZZJnEQ+PX4AfclFD9r1LxSMuP6GDaM3uQfZA/TdAKyoc5V nmELDP/p3qs= =DwoV -----END PGP SIGNATURE-----