Joomla Core Multiple Vulnerabilities Fixed by 3.4.5


Description   (#Several vulnerabilities were reported in Joomla's core:#- CVE-2015-7297, CVE-2015-7857 and CVE-2015-7858: several SQL injections##- CVE-2015-7859: ACL bypass in "com_contenthistory" module allowing a read access to data which should be access restricted##- CVE-2015-7899: ACL bypass in "com_content" module allowing a read access to data which should be access restricted.#Updated, 23/10/2015:#A proof of concept is available for these vulnerabilities.#Updated, 24/10/2015:#Additional information are available for CVE-2015-7857:#This vulnerability is located in the "/administrator/components/com_contenthistory/models/history.php" page and allows a remote attacker to obtain the administrator session key.#Updated, 27/10/2015:#An exploitation code for the vulnerability CVE-2015-7297 has been added to the Metasploit framework.#Updated, 28/10/2015:#The joomla3 packages provided by FreeBSD are vulnerable.#Updated, 20/11/2015:#An exploitation code for the CVE-2015-7857 and 7858 vulnerabilities has been added to the Metasploit framework.)
     
Vulnerable Products   Vulnerable OS:
FreeBSD (FreeBSD) - AllVulnerable Software:
Joomla (OSM Development Team) - 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.2.4, ..., 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4
     
Solution   Version 3.4.5 of Joomla fixes these vulnerabilities.
     
CVE   CVE-2015-7899
CVE-2015-7859
CVE-2015-7858
CVE-2015-7857
CVE-2015-7297
     
References   - Joomla! : 3.4.5 Released
https://www.joomla.org/announcements/release-news/5634-joomla-3-4-5-released.html
- Trustwave: Joomla SQL Injection Vulnerability Exploit Results in Full Administrative Access
https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/?page=1&year=0&month=0
- VuXML : Joomla! -- Core - ACL Violation vulnerabilities
https://www.vuxml.org/freebsd/03e54e42-7ac6-11e5-b35a-002590263bf5.html
- VuXML : Joomla! -- Core - SQL Injection/ACL Violation vulnerabilities
https://www.vuxml.org/freebsd/0ebc6e78-7ac6-11e5-b35a-002590263bf5.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
SQL injection Prevention - GET : suspicious SQL statement in header
4.0.0
SQL injection Prevention - GET : Authentication bypass attempt with OR statement
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-10-22 

 Target Type 
Server 

 Possible exploit 
Remote