{"id":23165,"date":"2020-12-09T09:47:55","date_gmt":"2020-12-09T01:47:55","guid":{"rendered":"https:\/\/web.mwwsb.com.my\/pjci\/?post_type=kb&#038;p=23165"},"modified":"2022-09-08T21:40:30","modified_gmt":"2022-09-08T13:40:30","slug":"security-alert-joomla-vulnerability-info","status":"publish","type":"kb","link":"https:\/\/www.casbay.com\/guide\/kb\/security-alert-joomla-vulnerability-info","title":{"rendered":"SECURITY ALERT: Joomla vulnerability [INFO]"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"23165\" class=\"elementor elementor-23165\" data-elementor-post-type=\"kb\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b9372b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b9372b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0c60f4b\" data-id=\"0c60f4b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87eaa11 elementor-widget elementor-widget-heading\" data-id=\"87eaa11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURITY ALERT: Joomla vulnerability [INFO]<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc2ee37 elementor-widget elementor-widget-text-editor\" data-id=\"dc2ee37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span class=\"word\">Joomla vulnerability <\/span><span class=\"word\">has\u00a0<\/span><span class=\"word\">been\u00a0<\/span><span class=\"word\">notified\u00a0<\/span><span class=\"word\">to\u00a0<\/span><span class=\"word\">our\u00a0<\/span><span class=\"word\">security <\/span><span class=\"word\">team <\/span><span class=\"word\">that\u00a0<\/span><span class=\"word\">allows <\/span><span class=\"word\">hackers\u00a0<\/span><span class=\"word\">or <\/span><span class=\"word\">unauthorised. For instance, I<\/span><span class=\"word\">ndividuals\u00a0<\/span><span class=\"word\">to\u00a0<\/span><span class=\"word\">access\u00a0<\/span><span class=\"word\">your\u00a0<\/span><span class=\"word\">Joomla\u00a0<\/span><span class=\"word\">hosting.<\/span><br \/>However, see more details below:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70f9d4b elementor-widget elementor-widget-text-editor\" data-id=\"70f9d4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"http:\/\/developer.joomla.org\/security\/news\/540-20120902-core-xss-vulnerability\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" link=\"external\" class=\"broken_link\"><strong>Joomla Developer\u2019s Security News<\/strong><\/a><br \/><a href=\"http:\/\/www.darksecurity.de\/advisories\/2012\/SSCHADV2012-014.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" link=\"external\" class=\"broken_link\"><strong>Dark Security\u2019s Advisories<\/strong><\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8a2fa elementor-widget elementor-widget-heading\" data-id=\"2e8a2fa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Extra information<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78853be elementor-widget elementor-widget-heading\" data-id=\"78853be\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Introduction<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e6e0b5 elementor-widget elementor-widget-text-editor\" data-id=\"4e6e0b5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"http:\/\/www.joomla.org\/\" rel=\"noopener\">Joomla<\/a> is one of the most popular open-source content management systems. It is especially <strong>a common target for attackers<\/strong> due to its popularity and the wide variety of extensions that are available to us. Therefore, we would recommend you to use some Joomla security scans to test your site. Besides, the scans are also useful to detect security issues, configuration errors, and poor reputation links. Thus, by using them, you can get to work <strong>mitigating the Joomla vulnerability<\/strong>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3a4b41 elementor-widget elementor-widget-heading\" data-id=\"e3a4b41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Vulnerability <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-432d979 elementor-widget elementor-widget-text-editor\" data-id=\"432d979\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The vulnerability allows hackers to hack Joomla websites through the Media Manager. To exploit the vulnerability, the attacker has to find a Joomla site that allows access to the media manager to its users. Then, s\/he will register an account and use the vulnerability. They will use it to upload a malicious shell script to this site through the Media Manager. After that, the attacker can do pretty much anything like edit your files, access your database, delete information, and others.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59aee27 elementor-widget elementor-widget-heading\" data-id=\"59aee27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-510ee33 elementor-widget elementor-widget-text-editor\" data-id=\"510ee33\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Security is as important as website design and content. However, sadly we often ignore this until negative impacts occur. Not correctly configured\/hardened Joomla server can be vulnerable to many. These include remote code execution, SQL Injection, Cross-Site Scripting, Information leakage, etc.<\/p><p>Furthermore, security is a process cycle, which one should always perform against web applications. There are some great Joomla security scanner tools out there such as <a href=\"https:\/\/hackertarget.com\/joomla-security-scan\/\" rel=\"noopener\">Hacker Target<\/a>, <a href=\"https:\/\/detectify.com\/cms-security\" rel=\"noopener\">Detectify<\/a>, <a href=\"https:\/\/geekflare.com\/recommends\/sucuri-sitecheck\/\" class=\"broken_link\" rel=\"noopener\">SUCURI<\/a>, <a href=\"https:\/\/www.siteguarding.com\/en\" rel=\"noopener\">SiteGuarding<\/a>, and more.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SECURITY ALERT: Joomla vulnerability [INFO] Joomla vulnerability has\u00a0been\u00a0notified\u00a0to\u00a0our\u00a0security team that\u00a0allows hackers\u00a0or unauthorised. For instance, Individuals\u00a0to\u00a0access\u00a0your\u00a0Joomla\u00a0hosting.However, see more details below: Joomla Developer\u2019s Security NewsDark Security\u2019s Advisories Extra information Introduction Joomla is one of the most popular open-source content management systems. It is especially a common target for attackers due to its popularity and the wide variety [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"kbtopic":[43,117],"kbtag":[106],"mkb_version":[],"_links":{"self":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23165"}],"collection":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/comments?post=23165"}],"version-history":[{"count":4,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23165\/revisions"}],"predecessor-version":[{"id":37002,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23165\/revisions\/37002"}],"wp:attachment":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/media?parent=23165"}],"wp:term":[{"taxonomy":"kbtopic","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kbtopic?post=23165"},{"taxonomy":"kbtag","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kbtag?post=23165"},{"taxonomy":"mkb_version","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/mkb_version?post=23165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}