{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p><span style=\"color: #ff0000;\" data-darkreader-inline-color=\"\">[Mise \u00e0 jour du 31 mars 2022]</span></p> <ul> <li>Joomla! CMS versions 3.x.x ant\u00e9rieures \u00e0 3.10.8</li> <li>Joomla! CMS versions 4.x.x ant\u00e9rieures \u00e0 4.1.2</li> </ul> <p>Les versions 3.10.8 et 4.1.2 de Joomla contiennent tous les correctifs de s\u00e9curit\u00e9 des versions 3.10.7 et 4.1.1 sauf le correctif 20220303 qui a \u00e9t\u00e9 supprim\u00e9 \u00e0 la suite d'un probl\u00e8me d'impl\u00e9mentation.</p> <p><span class=\"mx_MTextBody mx_EventTile_content\"><span class=\"mx_EventTile_body\" dir=\"auto\">Si les versions 4.1.1 ou 3.10.7 ont \u00e9t\u00e9 install\u00e9es, l'\u00e9diteur sugg\u00e8re d'appliquer la proc\u00e9dure suivante :</span></span></p> <p><span class=\"mx_MTextBody mx_EventTile_content\"><span class=\"mx_EventTile_body\" dir=\"auto\"><a class=\"linkified\" href=\"https://docs.joomla.org/J3.x:After_going_to_4.1,1_or_3.10.7_some_users_can%27t_login_anymore\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">https://docs.joomla.org/J3.x:After_going_to_4.1,1_or_3.10.7_some_users_can%27t_login_anymore</a></span></span></p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-23799","url":"https://www.cve.org/CVERecord?id=CVE-2022-23799"},{"name":"CVE-2022-23795","url":"https://www.cve.org/CVERecord?id=CVE-2022-23795"},{"name":"CVE-2022-23798","url":"https://www.cve.org/CVERecord?id=CVE-2022-23798"},{"name":"CVE-2022-23793","url":"https://www.cve.org/CVERecord?id=CVE-2022-23793"},{"name":"CVE-2022-23794","url":"https://www.cve.org/CVERecord?id=CVE-2022-23794"},{"name":"CVE-2022-23797","url":"https://www.cve.org/CVERecord?id=CVE-2022-23797"},{"name":"CVE-2022-23801","url":"https://www.cve.org/CVERecord?id=CVE-2022-23801"},{"name":"CVE-2022-23800","url":"https://www.cve.org/CVERecord?id=CVE-2022-23800"}],"links":[],"reference":"CERTFR-2022-AVI-285","revisions":[{"description":"Version initiale","revision_date":"2022-03-30T00:00:00.000000"},{"description":"Ajout des informations concernant le retrait du correctif de s\u00e9curit\u00e9 20220303 dans les versions Joomla 3.10.8 et 4.1.2","revision_date":"2022-03-31T00:00:00.000000"},{"description":"correction format","revision_date":"2024-05-17T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Joomla. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n","title":"[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans Joomla","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 875-20220306 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/875-20220306-core-inadequate-validation-of-internal-urls.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 876-20220307 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/876-20220307-core-variable-tampering-on-jinput-request-data.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 5858 du 30 mars 2022","url":"https://www.joomla.org/announcements/release-news/5858-joomla-4-1-2-and-3-10-8-release.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 877-20220308 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/877-20220308-core-inadequate-content-filtering-within-the-filter-code.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 870-20220301 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/870-20220301-core-zip-slip-within-the-tar-extractor.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 878-20220309 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/878-20220309-core-xss-attack-vector-through-svg.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 874-20220305 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/874-20220305-core-inadequate-filtering-on-the-selected-ids.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 870-20220302 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/871-20220302-core-path-disclosure-within-filesystem-error-messages.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Joomla 872-20220303 du 29 mars 2022","url":"https://developer.joomla.org/security-centre/872-20220303-core-user-row-are-not-bound-to-a-authentication-mechanism.html"}]}
