Vulnerabilities > CVE-2019-15028 - Unspecified vulnerability in Joomla Joomla!

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
joomla
nessus

Summary

In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.

Vulnerable Configurations

Part Description Count
Application
Joomla
257

Nessus

NASL familyCGI abuses
NASL idJOOMLA_3911.NASL
descriptionAccording to its self-reported version, the instance of Joomla! running on the remote web server is 1.6.x prior to 3.9.11. It is, therefore, affected by a vulnerability in com_contact due to improper access control checks. A remote attacker can exploit this to submit mail in disabled forms. Note that Nessus has not tested for this issue but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id128077
published2019-08-22
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/128077
titleJoomla! 1.6.x < 3.9.11 Joomla 3.9.11 Release (5775-joomla-3-9-11)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(128077);
  script_version("1.3");
  script_cvs_date("Date: 2019/10/17 14:31:04");

  script_cve_id("CVE-2019-15028");

  script_name(english:"Joomla! 1.6.x < 3.9.11 Joomla 3.9.11 Release (5775-joomla-3-9-11)");
  script_summary(english:"Checks the version of Joomla!.");

  script_set_attribute(attribute:"synopsis", value:
"A PHP application running on the remote web server is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the instance of Joomla! running on the remote web server is 1.6.x prior to
3.9.11. It is, therefore, affected by a vulnerability in com_contact due to improper access control checks. A remote
attacker can exploit this to submit mail in disabled forms.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://www.joomla.org/announcements/release-news/5775-joomla-3-9-11.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3cb18378");
  # https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?04c9107a");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Joomla! version 3.9.11 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-15028");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/08/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/22");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:joomla:joomla\!");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("joomla_detect.nasl");
  script_require_keys("installed_sw/Joomla!", "www/PHP");
  script_require_ports("Services/www", 80);

  exit(0);
}

include('vcf.inc');
include('http.inc');

port = get_http_port(default:80, php:TRUE);
app_info = vcf::get_app_info(app:'Joomla!', port:port, webapp:TRUE);
vcf::check_granularity(app_info:app_info, sig_segments:3);

constraints = [
  { 'min_version' : '1.6.2', 'fixed_version' : '3.9.11' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);