First published: Tue Jul 14 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.2 allows remote attackers to hijack the authentication of unspecified victims for requests that upload code via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =3.2.0 | |
Joomla | =3.2.1 | |
Joomla | =3.2.2 | |
Joomla | =3.2.3 | |
Joomla | =3.2.4 | |
Joomla | =3.2.5 | |
Joomla | =3.3.0 | |
Joomla | =3.3.1 | |
Joomla | =3.3.2 | |
Joomla | =3.3.3 | |
Joomla | =3.3.4 | |
Joomla | =3.3.5 | |
Joomla | =3.4.0 | |
Joomla | =3.4.0-alpha | |
Joomla | =3.4.0-beta1 | |
Joomla | =3.4.0-beta2 | |
Joomla | =3.4.0-beta3 | |
Joomla | =3.4.0-rc1 | |
Joomla | =3.4.1 | |
Joomla | =3.4.1-rc1 | |
Joomla | =3.4.1-rc2 | |
Joomla | =3.4.2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5397 is considered to be of high severity because it allows remote attackers to hijack user authentication.
To fix CVE-2015-5397, update your Joomla! installation to version 3.4.2 or later.
CVE-2015-5397 affects Joomla! versions 3.2.0 through 3.4.1.
CVE-2015-5397 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2015-5397 potentially allows attackers to upload malicious code through compromised authentication.