First published: Thu Mar 04 2021(Updated: )
An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.
Credit: security@joomla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla Joomla\! | >=3.2.0<3.9.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Joomla issue is CVE-2021-23128.
The severity of CVE-2021-23128 is critical with a severity value of 9.1.
Joomla versions 3.2.0 through 3.9.24 are affected by this vulnerability.
The potential insecure implementation in FOF (FOFEncryptRandval) was replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.
You can find more information about this vulnerability on the Joomla security center website: [https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html](https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html)