First published: Tue Feb 12 2019(Updated: )
An issue was discovered in Joomla! before 3.9.3. The phar:// stream wrapper can be used for object injection attacks because there is no protection mechanism (such as the TYPO3 PHAR stream wrapper) to prevent use of the phar:// handler for non .phar-files.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/joomla/joomla-cms | >=2.5.0<3.9.3 | 3.9.3 |
Joomla | >=2.5.0<=3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7743 is classified as a high-severity vulnerability due to its potential for object injection attacks.
To fix CVE-2019-7743, upgrade Joomla! to version 3.9.3 or later.
CVE-2019-7743 affects Joomla! versions prior to 3.9.3, including all versions from 2.5.0 to 3.9.2.
CVE-2019-7743 enables object injection attacks via the phar:// stream wrapper.
While specific exploits for CVE-2019-7743 have not been publicly disclosed, the vulnerability's nature poses a high risk for exploitation.