Description
Joomla! Core is prone to multiple vulnerabilities, including cross-site scripting and arbitrary file upload vulnerabilities. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. Joomla! Core versions ranging from 1.5.0 and up to and including 3.8.11 are vulnerable.
Remediation
Update to Joomla! Core version 3.8.12 or latest
References
Related Vulnerabilities
Oracle JRE CVE-2013-2472 Vulnerability (CVE-2013-2472)
WordPress Plugin Forms-Form builder and Contact form Multiple Unspecified Vulnerabilities (1.4.7)
Python Uncontrolled Resource Consumption Vulnerability (CVE-2020-14422)
PHP CVE-2007-4670 Vulnerability (CVE-2007-4670)
Magento Insufficient Verification of Data Authenticity Vulnerability (CVE-2019-8124)