Vulnerabilities > CVE-2019-9713 - Missing Authorization vulnerability in Joomla Joomla!

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
joomla
CWE-862
nessus

Summary

An issue was discovered in Joomla! before 3.9.4. The sample data plugins lack ACL checks, allowing unauthorized access.

Common Weakness Enumeration (CWE)

Nessus

NASL familyCGI abuses
NASL idJOOMLA_394.NASL
descriptionAccording to its self-reported version number, the Joomla! installation running on the remote web server is prior to 3.9.4. It is, therefore, affected by multiple vulnerabilities: - A logic error exists in sample data plugins that allows remote attackers to gain unauthorized access to unspecified elements. (CVE-2019-9713) - Multiple flaws exist in input-validation processes that allow an unauthenticated, remote attacker to carry out cross-site scripting (XSS) attacks. (CVE-2019-9711, CVE-2019-9712, CVE-2019-9714) Note that Nessus has not attempted to exploit these issues but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id122814
published2019-03-13
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/122814
titleJoomla! 3.x < 3.9.4 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");

if (description)
{
  script_id(122814);
  script_version("1.4");
  script_cvs_date("Date: 2019/10/30 13:24:46");

  script_cve_id(
    "CVE-2019-9711",
    "CVE-2019-9712",
    "CVE-2019-9713",
    "CVE-2019-9714"
  );

  script_name(english:"Joomla! 3.x < 3.9.4 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of Joomla!.");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Joomla!
installation running on the remote web server is prior to 3.9.4.
It is, therefore, affected by multiple vulnerabilities:

  - A logic error exists in sample data plugins that allows
    remote attackers to gain unauthorized access to
    unspecified elements. (CVE-2019-9713)

  - Multiple flaws exist in input-validation processes that
    allow an unauthenticated, remote attacker to carry out
    cross-site scripting (XSS) attacks. (CVE-2019-9711,
    CVE-2019-9712, CVE-2019-9714)

Note that Nessus has not attempted to exploit these issues but has
instead relied only on the application's self-reported version number.");
  # https://www.joomla.org/announcements/release-news/5761-joomla-3-9-4-release.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ddcd3930");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Joomla! version 3.9.4 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-9713");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/03/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/13");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:joomla:joomla\!");
  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("joomla_detect.nasl");
  script_require_keys("installed_sw/Joomla!", "www/PHP", "Settings/ParanoidReport");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("http.inc");
include("vcf.inc");

port = get_http_port(default:80, php:TRUE);

if (report_paranoia < 2) audit(AUDIT_PARANOID);

app_info = vcf::get_app_info(app:"Joomla!", port:port, webapp:TRUE);

vcf::check_granularity(app_info:app_info, sig_segments:3);

constraints = [
  { "min_version" : "3.0.0", "fixed_version" : "3.9.4" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING, flags: {xss:true});