First published: Tue Feb 12 2019(Updated: )
An issue was discovered in Joomla! before 3.9.3. The phar:// stream wrapper can be used for object injection attacks because there is no protection mechanism (such as the TYPO3 PHAR stream wrapper) to prevent use of the phar:// handler for non .phar-files.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/joomla/joomla-cms | >=2.5.0<3.9.3 | 3.9.3 |
Joomla Joomla\! | >=2.5.0<=3.9.2 | |
>=2.5.0<=3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.